SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol.8, No.6, December 2018, pp. 5169~5177
ISSN: 2088-8708, DOI: 10.11591/ijece.v8i6.pp5169-5177  5169
Journal homepage: http://iaescore.com/journals/index.php/IJECE
Multi-Channel Preemptive Priority Model for Spectrum
Mobility in Cognitive Radio Networks
S. E. Saad1
, I. F. Tarrad2
, A. A. Ammar3
1
Departement of Electronics and Communications Engineering, High Institute for Engineering and Technology, Egypt
2, 3
Electrical Engineering Department, Faculty of Engineering, Al-Azhar University, Egypt
Article Info ABSTRACT
Article history:
Received Mar 2, 2018
Revised Jul 24, 2018
Accepted Aug 11, 2018
Cognitive Radio techniques have been proposed for improving utilization of
the spectrum by exploiting the unoccupied bands of the licensed spectrum.
This paper proposes a preemptive multi-channel access model for prioritized
cognitive radio networks using an iterative method of queuing theory to solve
the spectrum scarcity problem. The proposed model formulates accurate
closed form of an expected waiting time in the queue, an expected number of
users in the queue, an expected waiting time in the system, and an expected
number of users in the system. The results compared to the basic model
(without preemptive priority) show that, the waiting time in queue and the
waiting time in the system compared to the basic model will be improved by
92.99% and 33.15% respectively for class one secondary user. The results
also show that, the waiting time in queue and the waiting time in the system
will be improved by 43.25% and 15.42% respectively for class two
secondary users. The proposed model investigates the desirable schedules of
primary and secondary users.
Keyword:
Cognitive Radio
Multi-Channel
Preemptive Priority
Queuing Theory
Spectrum Mobility
Copyright © 2018Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
S. E. Saad,
Departement of Electronics and Communications Engineering,
High Institute for Engineering and Technology, Al-Obour,
Kilo 21 Cairo / Belbies Rd, Egypt-P.O. Box 27 Obour City, Egypt.
Email: s.elsayed8585@gmail.com
1. INTRODUCTION
During the last decade, the wireless communications have been developed. The actual spectral
occupancy over some frequency bands studied was found to be virtually empty. In O.W. Bello et al authors
carried out spectrum measurement in urban and rural locations, covering bands of 50 MHz and 6 GHz [1].
The results show that, the average spectral occupancy of 5.08% and 0.18% in urban and rural locations
respectively during weekdays and 1.45% on weekends for urban locations. So, the limited available spectrum
and the inefficiency using of the spectrum have become one of the current problems in wireless
communications. Cognitive radio technique has been proposed as a solution to these problems.
The cognitive radio technology is based on the opportunistic usage of the spectrum by allowing
unlicensed users to exploit frequency bands of licensed users. Opportunistic spectrum access involves two
tasks of cognitive radio system: spectrum sensing and dynamic spectrum access.
Many spectrum sensing techniques have been recently studied, namely Energy detection [2], hybrid
spectrum sensing method [3], discrete markov chain based method [4], eigen value based spectrum sensing
[5], and matched filter detector and cyclostationary detector [6]-[7].
Many dynamic spectrum access models have been studied. In L. Chen et al the authors proposed
M/M/1 queue which is represented by a two dimensional state transition graph [8]. The authors proposed a
queuing model for heterogeneous data transmissions in underlay cognitive radio networks. In this model,
 ISSN:2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5169 - 5177
5170
safety or emergency related messages possess preemptive higher priority over nonemergency messages. This
model has two classes; high priority for primary user and low priority for secondary user.
In M.E. Bayrakdar and A. Çalhan non-preemptive M/G/1 priority queuing model of spectrum hand-off
scheme was proposed in cognitive radio networks [9-10]. In T.C. Chu et al, the authors proposed a Dynamic
Spectrum Access scheme for cognitive radio networks, where priorities for the bandwidth, the spectrum
access, and spectrum hand-off are considered for three types of traffics [11]. Paper has adopted a multi-
dimensional Markov chain with three state variables to analyze the state transitions of the dynamic spectrum
access scheme which enables us to obtain the steady state distribution of the number of each kind of traffics
in the system.
It is very difficult to analyze the behavior of multi-channel of the priority queue model when
channel usage by primary and secondary users [12]. Although the vast research on the analysis of priority
queues with a single channel facility, efforts on the characterization of multi channel queues were not as
extensive or fruitful due to their complications. This is essentially unfortunate since the modeling of many
telecommunications problems can be suitably placed in the framework of a multi channel system, such as
multi channel cognitive radio networks [13].
In this paper, multi-channel preemptive priority model based on queuing theory has been proposed
as a solution to this problem. The main contributions of this paper are as follows:
1. Queuing based spectrum access scheme for prioritized cognitive radio networks is proposed.
2. An accurate analytical model for spectrum access queuing based scheme priority service discipline is
derived.
3. The proposed model can be applied for multi-priority secondary user.
4. The proposed model can be generalized for multi-channels.
The rest of this paper is organized as follows: In Section 2, the proposed model has been introduced.
The simulation results of the proposed model have been discussed in Section 3. Finally, Section 4 presents
the conclusion of the proposed model.
2. PROPOSED MODEL
In this section, a proposed model based on queuing theory has been presented. Symbols and
notations used in this paper are listed in Table 1.
Table 1. The Description of Symbols
Symbol Description
𝜆p Mean arrival rate of the primary user
𝜆si Mean arrival rate of class i secondary user
𝜆 Mean arrival rate of all users
µ mean service rate
𝜌 Utilization factor it’s = λ/Cμ
C number of channels in the system
𝑃𝑛
probability of exactly n users in the system
𝐿 𝑠
Average number of users in the system
𝐿 𝑞
Average number of users in the waiting buffer
𝑊𝑝
Average waiting time of the primary users in the system
𝑊si
Average waiting time of users in the system
𝑊𝑞
Average waiting time of users in buffer
2.1. Primary User Model
In this model, there are several channels used by primary users and can only be used by secondary
users when the channels are free. There are three possible cases; the arrived primary user may be encounter:
1. There is an empty channel so; the primary user will be accessed.
2. There isn't an empty channel and secondary user in service so; the secondary user will be ejected to
waiting buffer and primary user accessed.
3. There is neither an empty channel nor secondary user in service so; the primary user enters the queue.
Int J Elec& Comp Eng ISSN: 2088-8708 
Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks (S. E. Saad)
5171
Figure 1. Primary User Model
Figure 1 represents the possible three cases when the primary user has arrived.
2.2. Secondary User Model
The secondary users keep searching for channels that are free (available for use) at some points in
time. There are three possible cases; the secondary user may be encounter:
1. There is an empty channel so; the secondary user will be accessed.
2. There isn't an empty channel and there is lower priority secondary user in service so; the lower priority
secondary user will be ejected to waiting buffer and the higher priority user will be accessed.
3. There is neither an empty channel nor lower priority secondary user in service so; the arrived secondary
user enters the queue.
Figure 2. Secondary User Model
 ISSN:2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5169 - 5177
5172
Figure 2 shows the possible three cases; the secondary user may be encounter. Users are selected to
begin service in the order of their priority classes, but on a first come first served basis within each class.
There are two basic priority discipline models, preemptive priorities and non-preemptive priorities.
Preemptive priorities mean that, the lowest priority user being served is preempted whenever a higher priority
user enters the system. Non-preemptive priorities, a user being served cannot be preempted if a higher
priority user enters the queueing system. In this paper, the preemptive priority model has been selected.
2.3. Analytical Model
In this model, assume that; the arriving users and leaving users of the queuing system occur
according to the birth and death process. However, the term birth refers to the arrival of a new user into the
system, and death refers to the departure of a served user.
The solution has the following steps according to the general method described in [14]:
1. Obtain the steady state equations governing the queue.
2. Solve the equations for finding out the probability distribution of queue length by: a) Iterative method. b)
Using generating functions. c) Using linear operators.
3. Obtain formula for Ls, Lq, Ws and, Wq as shown in Table 1.
After constructing the balance equations for all the states in terms of the 𝑃𝑛 probabilities, this
system of equations can be solved.
By Applying this procedure yields
𝑃𝑛 =
{
1
𝑛!
. (
𝜆
𝜇
) 𝑛
𝑃0 𝑓𝑜𝑟 0 ≤ 𝑛 < 𝐶
1
𝐶!. 𝐶 𝑛−𝐶
. (
𝜆
𝜇
) 𝑛
𝑃0 𝑓𝑜𝑟 𝑛 ≥ 𝐶
(1)
A queueing model is based on the birth and death process, so the state of the system n represents the
number of users in the queueing system, the key measures of performance for the queueing system (L, Lq,
W, and Wq) can be obtained.
From definition of 𝐿 𝑞
𝐿 𝑞 = ∑(𝑛 − 𝐶)𝑃𝑛
∞
𝑛=𝐶
(2)
By solving this equation we get
𝐿 𝑞 =
1
𝐶. 𝐶!
.
(𝐶𝜌) 𝐶+1
(1 − 𝜌)2
. 𝑃0 (3)
It has been proved that in a steady state queuing system,
L = λ W (4)
This equation is called Little’s formula.
Assume that the mean service time is a constant,
1
μ
. It then follows that
W = Wq +
1
μ
(5)
These relationships are extremely important because they enable the fundamental parameters Lq,
Wq, L, and W to be immediately determined as soon as one is found analytically. This relation is fortunate
because some of these quantities often are much easier to find than others when a queuing model is solved
from basic principles.
2.4. The Average Waiting Time in the System
For Preemptive priority, waiting time for primary users must equal waiting time for the
corresponding one class model. Because the waiting times for primary users are completely unaffected by the
Int J Elec& Comp Eng ISSN: 2088-8708 
Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks (S. E. Saad)
5173
presence of users in the secondary classes, waiting time will be the same for any other values of arrival rates ,
including λsi = 0. The waiting time for primary user can be formulated from Equations (3), (4), and (5):
Wp =
1
[ c!
(cμ− λ)
(
λ
μ
)c
∑
(
λ
μ
)n
n!
+ c μ] [1 −
λp
c μ
]c−1
n=0
+
1
μ (6)
Waiting time for secondary user can be calculated by an iterative procedure.
Class one secondary user is completely unaffected by lower-priority classes, which can therefore be
ignored in the analysis. Let WX1 be the expected waiting time in the system of a random arrival in either of
these primary users and class one secondary users:
Wx1 =
1
[ c!
(cμ− λx1)
(
λx1
μ
)c
∑
(
λx1
μ
)n
n!
+ c μ] [1 −
λx1
c μ
]c−1
n=0
+
1
μ (7)
λx1 = λp + λs1 (8)
So the probability is that this arrival is primary user
λp
λp+ λs1
and
λs1
λp+ λs1
, that it is in class one secondary user.
Therefore, Wx1 =
λp
λp+ λs1
Wp +
λs1
λp+ λs1
Ws1 (9)
Ws1 =
λp + λs1
λs1
Wx1 −
λp
λs1
Wp (10)
For class two secondary user: Let WX2 be the expected waiting time in the system of a random
arrival in either of these primary users, class one secondary users, and class two secondary users:
Wx2 =
1
[ c!
(cμ− λx2)
(
λx2
μ
)c
∑
(
λx2
μ
)n
n!
+ c μ] [1 −
λx2
c μ
]c−1
n=0
+
1
μ (11)
λx2 = λp + λs1 + λs2 (12)
Wx2 =
λp
λp + λs1 + λs2
Wp +
λs1
λp + λs1 + λs2
Ws1 +
λs2
λp + λs1 + λs2
Ws2 (13)
Ws2 =
λp + λs1 + λs2
λs2
Wx2 −
λs1
λs2
Ws1 −
λp
λs2
Wp (14)
The waiting time for class three can be derived with the same procedures, and the other three
parameters can be easily formulated by using equations (4), and (5).
3. SIMULATION RESULTS
This section evaluates the proposed model using MATLAB. Results have been carried out by
varying the arrival rate of the primary users. The proposed model has been evaluated by four metrics namely,
expected waiting time in queue, expected number of users in queue, expected waiting time in the system, and
expected number of users in the system. Results have been obtained in the case of five channels.
3.1. Comparison between The Proposed Model and The Basic Model Queue in [15]
Authors in [15] provide the description and comparison of 13 structured and simulation modeling
systems (SSMS). Structural and simulation modeling systems are compared to each other. Structural model
simulated in [15] proposed queuing model without priority. In this subsection, results obtained from the
proposed model will be compared with the results in [15]. The parameters used in this simulation are the
same as the parameters used in [15].
 ISSN:2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5169 - 5177
5174
Table 2. Comparison of the Proposed Model with the Basic Model in [15]
Parameter
Proposed Model
Results of
[15]PU SU1 SU2 SU3
Total
Network
Lq 0.0001939 0.0084 0.0657 0.2799 0.3541939 0.354
L 0.7502 0.7584 0.8157 1.0299 3.3542 3.354
Wq 0.0077572 0.3374869 2.6267 11.197 3.542236 3.542
W 30.008 30.337 32.627 41.197 33.54225 33.542
As shown in Table 2, total results obtained from the proposed model are the same as the results in
[15]. All measured time values in unit time. This simulation has been performed to prove that, the proposed
model is validated by comparing the total results achieved with the results of the conventional model.
In I. Yakimov et al a conventional queuing model without priority was presented, which does not
meet the requirements for cognitive radio networks [15]. This paper proposes a model for multi-channel,
multi-classes cognitive radio networks using the preemptive priority model based on queuing theory. A
performance analysis in the most general form can be conducted by the proposed model. In the next
subsection, the proposed model will be analyzed to ensure priority for primary users and ensure priority for
higher class secondary user over lower class at a different arrival rate.
3.2. Performance Evaluation of the Proposed Model at Different Request Rate
In this simulation, the arrival rate of the primary users may vary between 0.01-4 request/sec. In this
analysis, the arrival rate of the seconddary users is 4 request/sec for each class, and the service rate is 4
request/sec for each channel.
Figure 3. Expected Waiting Time in the Queue Figure 4. Expected Waiting Time in the System
The performance in terms of waiting time in buffer is shown in Figure 3. It can be observed that, the waiting
time in buffer for primary user is the lowest in the system. Results show that, at the point of λp = 4, λs1 = λs2 =
λs3 = 4 request/sec; Waiting time for primary and three classes of secondary user is 0.24 ms, 9.7 ms, 78.6 ms,
and 465.6 ms respectively. We can examine the effect of priority schedule at this point. The waiting time in
the queue without priority is 138.5 ms, so, the priority schedule improves the waiting time in queue for class
one secondary users, and class two secondary users by 92.99%, and 43.25% respectively compared to the
basic model without priority.
It is important to note that, the average of waiting time for all users of the proposed model at any
point is exactly equal to the waiting time in the queue without priority First Come First Serve (FCFS)
discipline at the same point, so, the average of waiting time for all users at the point λp = 4, λs1 = λs2 = λs3 =
4 request/sec is 138.5 ms. It is observed that the waiting time in queue increases in an exponential order as
the arrival rate of primary users increased.
Int J Elec& Comp Eng ISSN: 2088-8708 
Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks (S. E. Saad)
5175
Figure 4 shows that, at the point of λp = 4 request/sec; waiting time for primary and three classes of
secondary user is 250.24 ms,259.7 ms, 328.6 ms, and 715.6 ms respectively. To study the impact of
priorities, the waiting time in the system without priority is 388.5 ms so, the priority schedule improves the
waiting time in class one secondary users, and class two secondary users by 33.15%, and 15.42%
respectively.
As the primary user arrival rate increases, then due to high priority, the primary user takes the
channel from secondary user and the secondary user will be ejected to waiting buffer. Further, as the primary
users use more channels in the system, then the waiting time to the secondary users should increase as
depicted in Figures 3 and 4. Then, if there isn't an empty channel for secondary user and there is lower
priority secondary user in service so; the lower priority secondary user will be ejected to waiting buffer and
the higher priority secondary user will be accessed. Consequently, the lower priority secondary user will be
more affected by increasing the primary user arrival rate.
Figure 5. Expected Number of Users in Waiting Figure 6. Expected Number of Users in System
As shown in Figure 5, the number of users in the waiting buffer for primary users is lower than
others users. Results show that, at the point of λp = 4request/sec; number of users in the waiting buffer for
primary and three classes of secondary user is 0.00096, 0.0388, 0.3144, and 1.86 respectively. To study the
impact of priorities, the waiting time in the system without priority is 2.22 so; the priority schedule improves
the waiting time in class one secondary users, and class two secondary users by 93%, and 43.35%
respectively.
Figure 6 shows that, the number of users in the system for primary users are lower than others users.
Results show that, at the point λp = 4request/sec; number of users in the system for primary and three classes
of secondary user is 1.001, 1.0388, 1.3144, and 2.8622 respectively. To study the impact of priorities, the
number of users in the system without priority is 6.22 so; the priority schedule improves the number of users
in the system in class one secondary users, and class two secondary users by 33.2%, and 15.47%
respectively.
From the performance analysis results, it is concluded that, at the arrival rate of the primary user
increases, the waiting time and the number of users increase, but the priority of each class is reserved. The
waiting time for primary users are completely unaffected by the presence of users in the secondary classes.
In most previous studies, the authors consider that the secondary user is a single class. This
consideration does not meet the needs of multiple applications for the use of cognitive radio. Therefore, the
model presented in this paper is a solution to this problem. Compared with the previous works [8- 10, 12], the
authors have assumed the cognitive radio networks by assuming the problem as a single channel. However,
these models do not adequately overcome the need to analyze of cognitive radio networks as they have
multiple channels. Therefore, the model presented in this paper can be efficiently used to analyze the
behavior of multi-channel of the priority queue model for cognitive radio networks.
 ISSN:2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5169 - 5177
5176
4. CONCLUSION
In this paper, priority based preemptive queuing model has been proposed for channel access in
cognitive radio networks. Steady state analysis of the proposed model is presented. Preemption priority is
utilized to meet requirements of the class one and class two secondary users. The proposed model gives the
commendable schedules of primary and secondary users.This work can be extended to evaluate a preemptive
priority discipline in event simulator, and can be extended to analyze the performance in the case of finite
size of waiting buffer.
REFERENCES
[1] O.W. Bello, O.A. Sowande, S.O. Onidare, M.Y. Muhammada, and A.A. Ayeni, “Large scale spectrum survey in
rural and urban environments within the 50 MHz–6 GHz bands”, Elsevier, Measurement Journal 91, 2016.
[2] F.Z. El Bahi, H. Ghennioui, and M. Zouak, ” Performance Evaluation of Energy Detector Based Spectrum Sensing
for Cognitive Radio using NI USRP-2930”, International Journal of Electrical and Computer Engineering
(IJECE), vol. 7, no. 4, pp. 1934 – 1940, 2017.
[3] A.S. Khobragade1, and R. D. Raut, ” Hybrid Spectrum Sensing Method for Cognitive Radio”, International
Journal of Electrical and Computer Engineering (IJECE), vol. 7, no.5, pp. 2683 – 2695, 2017.
[4] Mohammadreza Amini, Asra Mirzavandi, Mosrafa Rezaei, “Discrete Markov Chain Based Spectrum Sensing for
Cognitive Radio”, International Journal of Electrical and Computer Engineering (IJECE), vol. 5, no. 2, pp. 297 –
30, 2015.
[5] S.S. Ali, C. Liu, and M. Jin, “Minimum Eigenvalue Detection for Spectrum Sensing in Cognitive Radio”,
International Journal of Electrical and Computer Engineering (IJECE), vol. 4, no. 4, p. 623, 2014.
[6] H. Sun, A. Nallanathan, C.X. Wang, and Y. Chen, “Wideband spectrum sensing for cognitive radio networks: a
survey”, IEEE Wirel. Commun., vol. 20, no. 2, pp. 7481, 2013.
[7] J. Avila, and K. Thenmozhi, “Multiband OFDM for Cognitive Radio – A Way for Cyclostationary Detection and
Interference Cancellation”, International Journal of Electrical and Computer Engineering (IJECE), vol. 6, no. 4,
pp. 1702 – 1709, 2016.
[8] L. Chen, L. Huang, H. Xu, and J. Hu, “Queueing Analysis for Preemptive Transmission in Underlay Cognitive
Radio Networks”, International Journal of Communication Systems, 29: 1138–1155. doi: 10.1002., John Wiley &
Sons, Ltd, 2016.
[9] M.E. Bayrakdar, and, A. Çalhan, “Improving spectrum handoff utilization for prioritized cognitive radio users by
exploiting channel bonding with starvation mitigation”, Elsevier, International Journal of Electronics and
Communications (AEÜ), 2017.
[10] M.E. Bayrakdar, and, A. Çalhan, “Non-Preemptive Queueing Model of Spectrum Handoff Scheme based on
Prioritized Data Traffic in Cognitive Wireless Networks”, ETRI Journal, 39 (4), 558-569, 2017.
[11] T.C. Chu, H. Phan, and H. Zepernick, “Dynamic Spectrum Access for Cognitive Radio NetworksWith Prioritized
Traffics”, IEEE communications letters, Vol. 18, NO. 7, 2014.
[12] V. Kumar, S. Minz , and Vipin Kumar, “Performance analysis of cognitive radio networks under spectrum sharing
using queuing approach”, Elsevier, Computers and Electrical Engineering 52, 2016.
[13] Navid Tadayon, “Modeling, Design and Analysis of Multi-Channel Cognitive Radio Networks”, PHD Thesis,
2016.
[14] P. Kandasamy, K. Thilagavathi, and K. Gunavathi, “Probability statistics and Queuing theory”, S. Chand
&Company LTD., New Delhi, 2006.
[15] I. Yakimov, A. Kirpichnikov, V. Mokshin, Z. Yakhina, and R. Gainullin, “The Comparison of Structured Modeling
and Simulation Modeling of Queueing Systems”, 16th International Conference, Information Technologies and
Mathematical Modelling (ITMM), Queueing Theory and Applications, Springer, 2017.
Int J Elec& Comp Eng ISSN: 2088-8708 
Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks (S. E. Saad)
5177
BIOGRAPHIES OF AUTHORS
Saad Elsayed is an Assistant Lecturer in the High Institute for Engineering and Technology, Al-
Obour, Cairo, Egypt. He received his BSc and MSc in Electronics and Communications
Engineering from the Faculty of Engineering, Al-Azhar University, Cairo, Egypt, in 2008 and
2015 respectively. He is currently a PhD student at Faculty of Engineering, Al-Azhar university,
Cairo. His research activities are within wireless communications and communication networks.
Ibrahim Fathy Tarrad received his BSc and MSc degrees in Electronics and Communications
Engineering from the Faculty of Engineering, Al-Azhar University, Cairo, Egypt, in 1984 and
1989, respectively. He received his PhD from the Technical University of Budapest in 1996. In
1996, he was appointed Lecturer at the Department of Electronics and Communications
Engineering, Al-Azhar University. In 2015, he became an Associate Professor in
Communications Engineering at the Faculty of Engineering, Al-Azhar University. His research
activities are within wireless communications and digital communications.
Abdelhady Abdelazim Ammar is a professor in Electronics and Communications Engineering
department, Faculty of Engineering, Al-Azhar University, Cairo, Egypt since 1988.
His research activities are within digital communications, mobile communications and digital
signal processing.

More Related Content

What's hot

A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
 
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networks
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networksGenetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networks
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networksIJECEIAES
 
IRJET- Channel and Rate Selection in Cognitive Radio Network
IRJET- Channel and Rate Selection in Cognitive Radio NetworkIRJET- Channel and Rate Selection in Cognitive Radio Network
IRJET- Channel and Rate Selection in Cognitive Radio NetworkIRJET Journal
 
Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...
Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...
Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...IJAAS Team
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile networkBasil John
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
 
Routing in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyRouting in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyIJERA Editor
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...IJECEIAES
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...
Review and Comparisons between Multiple Ant Based Routing  Algorithms in Mobi...Review and Comparisons between Multiple Ant Based Routing  Algorithms in Mobi...
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...IJMER
 
Analytical Study of Dedicated Network for IOT using LoRaWAN Technologies
Analytical Study of Dedicated Network for IOT using LoRaWAN TechnologiesAnalytical Study of Dedicated Network for IOT using LoRaWAN Technologies
Analytical Study of Dedicated Network for IOT using LoRaWAN TechnologiesIRJET Journal
 
Generalized optimal placement of PMUs considering power system observability,...
Generalized optimal placement of PMUs considering power system observability,...Generalized optimal placement of PMUs considering power system observability,...
Generalized optimal placement of PMUs considering power system observability,...IJECEIAES
 
Performance evaluation of decode and forward cooperative diversity systems ov...
Performance evaluation of decode and forward cooperative diversity systems ov...Performance evaluation of decode and forward cooperative diversity systems ov...
Performance evaluation of decode and forward cooperative diversity systems ov...IJECEIAES
 
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs) A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs) IJMER
 
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...IRJET Journal
 
Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks IJECEIAES
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos incaijjournal
 

What's hot (20)

A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
 
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networks
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networksGenetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networks
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networks
 
IRJET- Channel and Rate Selection in Cognitive Radio Network
IRJET- Channel and Rate Selection in Cognitive Radio NetworkIRJET- Channel and Rate Selection in Cognitive Radio Network
IRJET- Channel and Rate Selection in Cognitive Radio Network
 
Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...
Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...
Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile network
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
 
Routing in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyRouting in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A Survey
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...
Review and Comparisons between Multiple Ant Based Routing  Algorithms in Mobi...Review and Comparisons between Multiple Ant Based Routing  Algorithms in Mobi...
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...
 
Tsp2008 lp feng
Tsp2008 lp fengTsp2008 lp feng
Tsp2008 lp feng
 
Analytical Study of Dedicated Network for IOT using LoRaWAN Technologies
Analytical Study of Dedicated Network for IOT using LoRaWAN TechnologiesAnalytical Study of Dedicated Network for IOT using LoRaWAN Technologies
Analytical Study of Dedicated Network for IOT using LoRaWAN Technologies
 
Generalized optimal placement of PMUs considering power system observability,...
Generalized optimal placement of PMUs considering power system observability,...Generalized optimal placement of PMUs considering power system observability,...
Generalized optimal placement of PMUs considering power system observability,...
 
Ad04507176183
Ad04507176183Ad04507176183
Ad04507176183
 
Performance evaluation of decode and forward cooperative diversity systems ov...
Performance evaluation of decode and forward cooperative diversity systems ov...Performance evaluation of decode and forward cooperative diversity systems ov...
Performance evaluation of decode and forward cooperative diversity systems ov...
 
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs) A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
 
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
 
Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 

Similar to Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Radio Networks

IRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum AllocationIRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum AllocationIRJET Journal
 
Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio IJECEIAES
 
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...eSAT Journals
 
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...IJERA Editor
 
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio NetworksEnhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio NetworksIRJET Journal
 
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage EnvironmentClient Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage EnvironmentIRJET Journal
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...IRJET Journal
 
IRJET- Review Paper on Throughput Optimization and Spectrum Sensing in Cognit...
IRJET- Review Paper on Throughput Optimization and Spectrum Sensing in Cognit...IRJET- Review Paper on Throughput Optimization and Spectrum Sensing in Cognit...
IRJET- Review Paper on Throughput Optimization and Spectrum Sensing in Cognit...IRJET Journal
 
A price based spectrum sharing scheme in wireless cellular networks
A price based spectrum sharing scheme in wireless cellular networksA price based spectrum sharing scheme in wireless cellular networks
A price based spectrum sharing scheme in wireless cellular networksAlexander Decker
 
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET Journal
 
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOA SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOijngnjournal
 
International journal of engineering issues vol 2015 - no 2 - paper7
International journal of engineering issues   vol 2015 - no 2 - paper7International journal of engineering issues   vol 2015 - no 2 - paper7
International journal of engineering issues vol 2015 - no 2 - paper7sophiabelthome
 
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET Journal
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networksszhb
 
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...ijeei-iaes
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
 

Similar to Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Radio Networks (20)

E010312832
E010312832E010312832
E010312832
 
IRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum AllocationIRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum Allocation
 
Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio
 
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...
 
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
 
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio NetworksEnhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
 
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage EnvironmentClient Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
 
IRJET- Review Paper on Throughput Optimization and Spectrum Sensing in Cognit...
IRJET- Review Paper on Throughput Optimization and Spectrum Sensing in Cognit...IRJET- Review Paper on Throughput Optimization and Spectrum Sensing in Cognit...
IRJET- Review Paper on Throughput Optimization and Spectrum Sensing in Cognit...
 
H1803064257
H1803064257H1803064257
H1803064257
 
A price based spectrum sharing scheme in wireless cellular networks
A price based spectrum sharing scheme in wireless cellular networksA price based spectrum sharing scheme in wireless cellular networks
A price based spectrum sharing scheme in wireless cellular networks
 
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
 
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOA SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
 
International journal of engineering issues vol 2015 - no 2 - paper7
International journal of engineering issues   vol 2015 - no 2 - paper7International journal of engineering issues   vol 2015 - no 2 - paper7
International journal of engineering issues vol 2015 - no 2 - paper7
 
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
 
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
 

More from IJECEIAES

Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...IJECEIAES
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...IJECEIAES
 
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...IJECEIAES
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...IJECEIAES
 
A deep learning framework for accurate diagnosis of colorectal cancer using h...
A deep learning framework for accurate diagnosis of colorectal cancer using h...A deep learning framework for accurate diagnosis of colorectal cancer using h...
A deep learning framework for accurate diagnosis of colorectal cancer using h...IJECEIAES
 
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...IJECEIAES
 
Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningIJECEIAES
 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportIJECEIAES
 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...IJECEIAES
 

More from IJECEIAES (20)

Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...
 
A deep learning framework for accurate diagnosis of colorectal cancer using h...
A deep learning framework for accurate diagnosis of colorectal cancer using h...A deep learning framework for accurate diagnosis of colorectal cancer using h...
A deep learning framework for accurate diagnosis of colorectal cancer using h...
 
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
 
Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learning
 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca Airport
 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...
 

Recently uploaded

Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfJNTUA
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.MdManikurRahman
 
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...Prakhyath Rai
 
ChatGPT Prompt Engineering for project managers.pdf
ChatGPT Prompt Engineering for project managers.pdfChatGPT Prompt Engineering for project managers.pdf
ChatGPT Prompt Engineering for project managers.pdfqasastareekh
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New HorizonMorshed Ahmed Rahath
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGKOUSTAV SARKAR
 
Multivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxMultivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxalijaker017
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfMadan Karki
 
How to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdfHow to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdftawat puangthong
 
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5T.D. Shashikala
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfragupathi90
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdfKamal Acharya
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdfKamal Acharya
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1T.D. Shashikala
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AISheetal Jain
 
Electrical shop management system project report.pdf
Electrical shop management system project report.pdfElectrical shop management system project report.pdf
Electrical shop management system project report.pdfKamal Acharya
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualBalamuruganV28
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2T.D. Shashikala
 

Recently uploaded (20)

Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.
 
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
 
ChatGPT Prompt Engineering for project managers.pdf
ChatGPT Prompt Engineering for project managers.pdfChatGPT Prompt Engineering for project managers.pdf
ChatGPT Prompt Engineering for project managers.pdf
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
 
Multivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxMultivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptx
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
 
How to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdfHow to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdf
 
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
Electrical shop management system project report.pdf
Electrical shop management system project report.pdfElectrical shop management system project report.pdf
Electrical shop management system project report.pdf
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2
 

Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Radio Networks

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol.8, No.6, December 2018, pp. 5169~5177 ISSN: 2088-8708, DOI: 10.11591/ijece.v8i6.pp5169-5177  5169 Journal homepage: http://iaescore.com/journals/index.php/IJECE Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks S. E. Saad1 , I. F. Tarrad2 , A. A. Ammar3 1 Departement of Electronics and Communications Engineering, High Institute for Engineering and Technology, Egypt 2, 3 Electrical Engineering Department, Faculty of Engineering, Al-Azhar University, Egypt Article Info ABSTRACT Article history: Received Mar 2, 2018 Revised Jul 24, 2018 Accepted Aug 11, 2018 Cognitive Radio techniques have been proposed for improving utilization of the spectrum by exploiting the unoccupied bands of the licensed spectrum. This paper proposes a preemptive multi-channel access model for prioritized cognitive radio networks using an iterative method of queuing theory to solve the spectrum scarcity problem. The proposed model formulates accurate closed form of an expected waiting time in the queue, an expected number of users in the queue, an expected waiting time in the system, and an expected number of users in the system. The results compared to the basic model (without preemptive priority) show that, the waiting time in queue and the waiting time in the system compared to the basic model will be improved by 92.99% and 33.15% respectively for class one secondary user. The results also show that, the waiting time in queue and the waiting time in the system will be improved by 43.25% and 15.42% respectively for class two secondary users. The proposed model investigates the desirable schedules of primary and secondary users. Keyword: Cognitive Radio Multi-Channel Preemptive Priority Queuing Theory Spectrum Mobility Copyright © 2018Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: S. E. Saad, Departement of Electronics and Communications Engineering, High Institute for Engineering and Technology, Al-Obour, Kilo 21 Cairo / Belbies Rd, Egypt-P.O. Box 27 Obour City, Egypt. Email: s.elsayed8585@gmail.com 1. INTRODUCTION During the last decade, the wireless communications have been developed. The actual spectral occupancy over some frequency bands studied was found to be virtually empty. In O.W. Bello et al authors carried out spectrum measurement in urban and rural locations, covering bands of 50 MHz and 6 GHz [1]. The results show that, the average spectral occupancy of 5.08% and 0.18% in urban and rural locations respectively during weekdays and 1.45% on weekends for urban locations. So, the limited available spectrum and the inefficiency using of the spectrum have become one of the current problems in wireless communications. Cognitive radio technique has been proposed as a solution to these problems. The cognitive radio technology is based on the opportunistic usage of the spectrum by allowing unlicensed users to exploit frequency bands of licensed users. Opportunistic spectrum access involves two tasks of cognitive radio system: spectrum sensing and dynamic spectrum access. Many spectrum sensing techniques have been recently studied, namely Energy detection [2], hybrid spectrum sensing method [3], discrete markov chain based method [4], eigen value based spectrum sensing [5], and matched filter detector and cyclostationary detector [6]-[7]. Many dynamic spectrum access models have been studied. In L. Chen et al the authors proposed M/M/1 queue which is represented by a two dimensional state transition graph [8]. The authors proposed a queuing model for heterogeneous data transmissions in underlay cognitive radio networks. In this model,
  • 2.  ISSN:2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5169 - 5177 5170 safety or emergency related messages possess preemptive higher priority over nonemergency messages. This model has two classes; high priority for primary user and low priority for secondary user. In M.E. Bayrakdar and A. Çalhan non-preemptive M/G/1 priority queuing model of spectrum hand-off scheme was proposed in cognitive radio networks [9-10]. In T.C. Chu et al, the authors proposed a Dynamic Spectrum Access scheme for cognitive radio networks, where priorities for the bandwidth, the spectrum access, and spectrum hand-off are considered for three types of traffics [11]. Paper has adopted a multi- dimensional Markov chain with three state variables to analyze the state transitions of the dynamic spectrum access scheme which enables us to obtain the steady state distribution of the number of each kind of traffics in the system. It is very difficult to analyze the behavior of multi-channel of the priority queue model when channel usage by primary and secondary users [12]. Although the vast research on the analysis of priority queues with a single channel facility, efforts on the characterization of multi channel queues were not as extensive or fruitful due to their complications. This is essentially unfortunate since the modeling of many telecommunications problems can be suitably placed in the framework of a multi channel system, such as multi channel cognitive radio networks [13]. In this paper, multi-channel preemptive priority model based on queuing theory has been proposed as a solution to this problem. The main contributions of this paper are as follows: 1. Queuing based spectrum access scheme for prioritized cognitive radio networks is proposed. 2. An accurate analytical model for spectrum access queuing based scheme priority service discipline is derived. 3. The proposed model can be applied for multi-priority secondary user. 4. The proposed model can be generalized for multi-channels. The rest of this paper is organized as follows: In Section 2, the proposed model has been introduced. The simulation results of the proposed model have been discussed in Section 3. Finally, Section 4 presents the conclusion of the proposed model. 2. PROPOSED MODEL In this section, a proposed model based on queuing theory has been presented. Symbols and notations used in this paper are listed in Table 1. Table 1. The Description of Symbols Symbol Description 𝜆p Mean arrival rate of the primary user 𝜆si Mean arrival rate of class i secondary user 𝜆 Mean arrival rate of all users µ mean service rate 𝜌 Utilization factor it’s = λ/Cμ C number of channels in the system 𝑃𝑛 probability of exactly n users in the system 𝐿 𝑠 Average number of users in the system 𝐿 𝑞 Average number of users in the waiting buffer 𝑊𝑝 Average waiting time of the primary users in the system 𝑊si Average waiting time of users in the system 𝑊𝑞 Average waiting time of users in buffer 2.1. Primary User Model In this model, there are several channels used by primary users and can only be used by secondary users when the channels are free. There are three possible cases; the arrived primary user may be encounter: 1. There is an empty channel so; the primary user will be accessed. 2. There isn't an empty channel and secondary user in service so; the secondary user will be ejected to waiting buffer and primary user accessed. 3. There is neither an empty channel nor secondary user in service so; the primary user enters the queue.
  • 3. Int J Elec& Comp Eng ISSN: 2088-8708  Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks (S. E. Saad) 5171 Figure 1. Primary User Model Figure 1 represents the possible three cases when the primary user has arrived. 2.2. Secondary User Model The secondary users keep searching for channels that are free (available for use) at some points in time. There are three possible cases; the secondary user may be encounter: 1. There is an empty channel so; the secondary user will be accessed. 2. There isn't an empty channel and there is lower priority secondary user in service so; the lower priority secondary user will be ejected to waiting buffer and the higher priority user will be accessed. 3. There is neither an empty channel nor lower priority secondary user in service so; the arrived secondary user enters the queue. Figure 2. Secondary User Model
  • 4.  ISSN:2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5169 - 5177 5172 Figure 2 shows the possible three cases; the secondary user may be encounter. Users are selected to begin service in the order of their priority classes, but on a first come first served basis within each class. There are two basic priority discipline models, preemptive priorities and non-preemptive priorities. Preemptive priorities mean that, the lowest priority user being served is preempted whenever a higher priority user enters the system. Non-preemptive priorities, a user being served cannot be preempted if a higher priority user enters the queueing system. In this paper, the preemptive priority model has been selected. 2.3. Analytical Model In this model, assume that; the arriving users and leaving users of the queuing system occur according to the birth and death process. However, the term birth refers to the arrival of a new user into the system, and death refers to the departure of a served user. The solution has the following steps according to the general method described in [14]: 1. Obtain the steady state equations governing the queue. 2. Solve the equations for finding out the probability distribution of queue length by: a) Iterative method. b) Using generating functions. c) Using linear operators. 3. Obtain formula for Ls, Lq, Ws and, Wq as shown in Table 1. After constructing the balance equations for all the states in terms of the 𝑃𝑛 probabilities, this system of equations can be solved. By Applying this procedure yields 𝑃𝑛 = { 1 𝑛! . ( 𝜆 𝜇 ) 𝑛 𝑃0 𝑓𝑜𝑟 0 ≤ 𝑛 < 𝐶 1 𝐶!. 𝐶 𝑛−𝐶 . ( 𝜆 𝜇 ) 𝑛 𝑃0 𝑓𝑜𝑟 𝑛 ≥ 𝐶 (1) A queueing model is based on the birth and death process, so the state of the system n represents the number of users in the queueing system, the key measures of performance for the queueing system (L, Lq, W, and Wq) can be obtained. From definition of 𝐿 𝑞 𝐿 𝑞 = ∑(𝑛 − 𝐶)𝑃𝑛 ∞ 𝑛=𝐶 (2) By solving this equation we get 𝐿 𝑞 = 1 𝐶. 𝐶! . (𝐶𝜌) 𝐶+1 (1 − 𝜌)2 . 𝑃0 (3) It has been proved that in a steady state queuing system, L = λ W (4) This equation is called Little’s formula. Assume that the mean service time is a constant, 1 μ . It then follows that W = Wq + 1 μ (5) These relationships are extremely important because they enable the fundamental parameters Lq, Wq, L, and W to be immediately determined as soon as one is found analytically. This relation is fortunate because some of these quantities often are much easier to find than others when a queuing model is solved from basic principles. 2.4. The Average Waiting Time in the System For Preemptive priority, waiting time for primary users must equal waiting time for the corresponding one class model. Because the waiting times for primary users are completely unaffected by the
  • 5. Int J Elec& Comp Eng ISSN: 2088-8708  Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks (S. E. Saad) 5173 presence of users in the secondary classes, waiting time will be the same for any other values of arrival rates , including λsi = 0. The waiting time for primary user can be formulated from Equations (3), (4), and (5): Wp = 1 [ c! (cμ− λ) ( λ μ )c ∑ ( λ μ )n n! + c μ] [1 − λp c μ ]c−1 n=0 + 1 μ (6) Waiting time for secondary user can be calculated by an iterative procedure. Class one secondary user is completely unaffected by lower-priority classes, which can therefore be ignored in the analysis. Let WX1 be the expected waiting time in the system of a random arrival in either of these primary users and class one secondary users: Wx1 = 1 [ c! (cμ− λx1) ( λx1 μ )c ∑ ( λx1 μ )n n! + c μ] [1 − λx1 c μ ]c−1 n=0 + 1 μ (7) λx1 = λp + λs1 (8) So the probability is that this arrival is primary user λp λp+ λs1 and λs1 λp+ λs1 , that it is in class one secondary user. Therefore, Wx1 = λp λp+ λs1 Wp + λs1 λp+ λs1 Ws1 (9) Ws1 = λp + λs1 λs1 Wx1 − λp λs1 Wp (10) For class two secondary user: Let WX2 be the expected waiting time in the system of a random arrival in either of these primary users, class one secondary users, and class two secondary users: Wx2 = 1 [ c! (cμ− λx2) ( λx2 μ )c ∑ ( λx2 μ )n n! + c μ] [1 − λx2 c μ ]c−1 n=0 + 1 μ (11) λx2 = λp + λs1 + λs2 (12) Wx2 = λp λp + λs1 + λs2 Wp + λs1 λp + λs1 + λs2 Ws1 + λs2 λp + λs1 + λs2 Ws2 (13) Ws2 = λp + λs1 + λs2 λs2 Wx2 − λs1 λs2 Ws1 − λp λs2 Wp (14) The waiting time for class three can be derived with the same procedures, and the other three parameters can be easily formulated by using equations (4), and (5). 3. SIMULATION RESULTS This section evaluates the proposed model using MATLAB. Results have been carried out by varying the arrival rate of the primary users. The proposed model has been evaluated by four metrics namely, expected waiting time in queue, expected number of users in queue, expected waiting time in the system, and expected number of users in the system. Results have been obtained in the case of five channels. 3.1. Comparison between The Proposed Model and The Basic Model Queue in [15] Authors in [15] provide the description and comparison of 13 structured and simulation modeling systems (SSMS). Structural and simulation modeling systems are compared to each other. Structural model simulated in [15] proposed queuing model without priority. In this subsection, results obtained from the proposed model will be compared with the results in [15]. The parameters used in this simulation are the same as the parameters used in [15].
  • 6.  ISSN:2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5169 - 5177 5174 Table 2. Comparison of the Proposed Model with the Basic Model in [15] Parameter Proposed Model Results of [15]PU SU1 SU2 SU3 Total Network Lq 0.0001939 0.0084 0.0657 0.2799 0.3541939 0.354 L 0.7502 0.7584 0.8157 1.0299 3.3542 3.354 Wq 0.0077572 0.3374869 2.6267 11.197 3.542236 3.542 W 30.008 30.337 32.627 41.197 33.54225 33.542 As shown in Table 2, total results obtained from the proposed model are the same as the results in [15]. All measured time values in unit time. This simulation has been performed to prove that, the proposed model is validated by comparing the total results achieved with the results of the conventional model. In I. Yakimov et al a conventional queuing model without priority was presented, which does not meet the requirements for cognitive radio networks [15]. This paper proposes a model for multi-channel, multi-classes cognitive radio networks using the preemptive priority model based on queuing theory. A performance analysis in the most general form can be conducted by the proposed model. In the next subsection, the proposed model will be analyzed to ensure priority for primary users and ensure priority for higher class secondary user over lower class at a different arrival rate. 3.2. Performance Evaluation of the Proposed Model at Different Request Rate In this simulation, the arrival rate of the primary users may vary between 0.01-4 request/sec. In this analysis, the arrival rate of the seconddary users is 4 request/sec for each class, and the service rate is 4 request/sec for each channel. Figure 3. Expected Waiting Time in the Queue Figure 4. Expected Waiting Time in the System The performance in terms of waiting time in buffer is shown in Figure 3. It can be observed that, the waiting time in buffer for primary user is the lowest in the system. Results show that, at the point of λp = 4, λs1 = λs2 = λs3 = 4 request/sec; Waiting time for primary and three classes of secondary user is 0.24 ms, 9.7 ms, 78.6 ms, and 465.6 ms respectively. We can examine the effect of priority schedule at this point. The waiting time in the queue without priority is 138.5 ms, so, the priority schedule improves the waiting time in queue for class one secondary users, and class two secondary users by 92.99%, and 43.25% respectively compared to the basic model without priority. It is important to note that, the average of waiting time for all users of the proposed model at any point is exactly equal to the waiting time in the queue without priority First Come First Serve (FCFS) discipline at the same point, so, the average of waiting time for all users at the point λp = 4, λs1 = λs2 = λs3 = 4 request/sec is 138.5 ms. It is observed that the waiting time in queue increases in an exponential order as the arrival rate of primary users increased.
  • 7. Int J Elec& Comp Eng ISSN: 2088-8708  Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks (S. E. Saad) 5175 Figure 4 shows that, at the point of λp = 4 request/sec; waiting time for primary and three classes of secondary user is 250.24 ms,259.7 ms, 328.6 ms, and 715.6 ms respectively. To study the impact of priorities, the waiting time in the system without priority is 388.5 ms so, the priority schedule improves the waiting time in class one secondary users, and class two secondary users by 33.15%, and 15.42% respectively. As the primary user arrival rate increases, then due to high priority, the primary user takes the channel from secondary user and the secondary user will be ejected to waiting buffer. Further, as the primary users use more channels in the system, then the waiting time to the secondary users should increase as depicted in Figures 3 and 4. Then, if there isn't an empty channel for secondary user and there is lower priority secondary user in service so; the lower priority secondary user will be ejected to waiting buffer and the higher priority secondary user will be accessed. Consequently, the lower priority secondary user will be more affected by increasing the primary user arrival rate. Figure 5. Expected Number of Users in Waiting Figure 6. Expected Number of Users in System As shown in Figure 5, the number of users in the waiting buffer for primary users is lower than others users. Results show that, at the point of λp = 4request/sec; number of users in the waiting buffer for primary and three classes of secondary user is 0.00096, 0.0388, 0.3144, and 1.86 respectively. To study the impact of priorities, the waiting time in the system without priority is 2.22 so; the priority schedule improves the waiting time in class one secondary users, and class two secondary users by 93%, and 43.35% respectively. Figure 6 shows that, the number of users in the system for primary users are lower than others users. Results show that, at the point λp = 4request/sec; number of users in the system for primary and three classes of secondary user is 1.001, 1.0388, 1.3144, and 2.8622 respectively. To study the impact of priorities, the number of users in the system without priority is 6.22 so; the priority schedule improves the number of users in the system in class one secondary users, and class two secondary users by 33.2%, and 15.47% respectively. From the performance analysis results, it is concluded that, at the arrival rate of the primary user increases, the waiting time and the number of users increase, but the priority of each class is reserved. The waiting time for primary users are completely unaffected by the presence of users in the secondary classes. In most previous studies, the authors consider that the secondary user is a single class. This consideration does not meet the needs of multiple applications for the use of cognitive radio. Therefore, the model presented in this paper is a solution to this problem. Compared with the previous works [8- 10, 12], the authors have assumed the cognitive radio networks by assuming the problem as a single channel. However, these models do not adequately overcome the need to analyze of cognitive radio networks as they have multiple channels. Therefore, the model presented in this paper can be efficiently used to analyze the behavior of multi-channel of the priority queue model for cognitive radio networks.
  • 8.  ISSN:2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5169 - 5177 5176 4. CONCLUSION In this paper, priority based preemptive queuing model has been proposed for channel access in cognitive radio networks. Steady state analysis of the proposed model is presented. Preemption priority is utilized to meet requirements of the class one and class two secondary users. The proposed model gives the commendable schedules of primary and secondary users.This work can be extended to evaluate a preemptive priority discipline in event simulator, and can be extended to analyze the performance in the case of finite size of waiting buffer. REFERENCES [1] O.W. Bello, O.A. Sowande, S.O. Onidare, M.Y. Muhammada, and A.A. Ayeni, “Large scale spectrum survey in rural and urban environments within the 50 MHz–6 GHz bands”, Elsevier, Measurement Journal 91, 2016. [2] F.Z. El Bahi, H. Ghennioui, and M. Zouak, ” Performance Evaluation of Energy Detector Based Spectrum Sensing for Cognitive Radio using NI USRP-2930”, International Journal of Electrical and Computer Engineering (IJECE), vol. 7, no. 4, pp. 1934 – 1940, 2017. [3] A.S. Khobragade1, and R. D. Raut, ” Hybrid Spectrum Sensing Method for Cognitive Radio”, International Journal of Electrical and Computer Engineering (IJECE), vol. 7, no.5, pp. 2683 – 2695, 2017. [4] Mohammadreza Amini, Asra Mirzavandi, Mosrafa Rezaei, “Discrete Markov Chain Based Spectrum Sensing for Cognitive Radio”, International Journal of Electrical and Computer Engineering (IJECE), vol. 5, no. 2, pp. 297 – 30, 2015. [5] S.S. Ali, C. Liu, and M. Jin, “Minimum Eigenvalue Detection for Spectrum Sensing in Cognitive Radio”, International Journal of Electrical and Computer Engineering (IJECE), vol. 4, no. 4, p. 623, 2014. [6] H. Sun, A. Nallanathan, C.X. Wang, and Y. Chen, “Wideband spectrum sensing for cognitive radio networks: a survey”, IEEE Wirel. Commun., vol. 20, no. 2, pp. 7481, 2013. [7] J. Avila, and K. Thenmozhi, “Multiband OFDM for Cognitive Radio – A Way for Cyclostationary Detection and Interference Cancellation”, International Journal of Electrical and Computer Engineering (IJECE), vol. 6, no. 4, pp. 1702 – 1709, 2016. [8] L. Chen, L. Huang, H. Xu, and J. Hu, “Queueing Analysis for Preemptive Transmission in Underlay Cognitive Radio Networks”, International Journal of Communication Systems, 29: 1138–1155. doi: 10.1002., John Wiley & Sons, Ltd, 2016. [9] M.E. Bayrakdar, and, A. Çalhan, “Improving spectrum handoff utilization for prioritized cognitive radio users by exploiting channel bonding with starvation mitigation”, Elsevier, International Journal of Electronics and Communications (AEÜ), 2017. [10] M.E. Bayrakdar, and, A. Çalhan, “Non-Preemptive Queueing Model of Spectrum Handoff Scheme based on Prioritized Data Traffic in Cognitive Wireless Networks”, ETRI Journal, 39 (4), 558-569, 2017. [11] T.C. Chu, H. Phan, and H. Zepernick, “Dynamic Spectrum Access for Cognitive Radio NetworksWith Prioritized Traffics”, IEEE communications letters, Vol. 18, NO. 7, 2014. [12] V. Kumar, S. Minz , and Vipin Kumar, “Performance analysis of cognitive radio networks under spectrum sharing using queuing approach”, Elsevier, Computers and Electrical Engineering 52, 2016. [13] Navid Tadayon, “Modeling, Design and Analysis of Multi-Channel Cognitive Radio Networks”, PHD Thesis, 2016. [14] P. Kandasamy, K. Thilagavathi, and K. Gunavathi, “Probability statistics and Queuing theory”, S. Chand &Company LTD., New Delhi, 2006. [15] I. Yakimov, A. Kirpichnikov, V. Mokshin, Z. Yakhina, and R. Gainullin, “The Comparison of Structured Modeling and Simulation Modeling of Queueing Systems”, 16th International Conference, Information Technologies and Mathematical Modelling (ITMM), Queueing Theory and Applications, Springer, 2017.
  • 9. Int J Elec& Comp Eng ISSN: 2088-8708  Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks (S. E. Saad) 5177 BIOGRAPHIES OF AUTHORS Saad Elsayed is an Assistant Lecturer in the High Institute for Engineering and Technology, Al- Obour, Cairo, Egypt. He received his BSc and MSc in Electronics and Communications Engineering from the Faculty of Engineering, Al-Azhar University, Cairo, Egypt, in 2008 and 2015 respectively. He is currently a PhD student at Faculty of Engineering, Al-Azhar university, Cairo. His research activities are within wireless communications and communication networks. Ibrahim Fathy Tarrad received his BSc and MSc degrees in Electronics and Communications Engineering from the Faculty of Engineering, Al-Azhar University, Cairo, Egypt, in 1984 and 1989, respectively. He received his PhD from the Technical University of Budapest in 1996. In 1996, he was appointed Lecturer at the Department of Electronics and Communications Engineering, Al-Azhar University. In 2015, he became an Associate Professor in Communications Engineering at the Faculty of Engineering, Al-Azhar University. His research activities are within wireless communications and digital communications. Abdelhady Abdelazim Ammar is a professor in Electronics and Communications Engineering department, Faculty of Engineering, Al-Azhar University, Cairo, Egypt since 1988. His research activities are within digital communications, mobile communications and digital signal processing.