SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 9, No. 3, June 2019, pp. 2057∼2063
ISSN: 2088-8708, DOI: 10.11591/ijece.v9i3.pp2057-2063 Ì 2057
Equity-based free channels assignment for secondary users
in a cognitive radio network
Said Lakhal1
, Zouhair Guennoun2
1
Mohammadia School of Engineering, Mohammed 5 University in Rabat, Morocco
2
ERSC formerly known as LEC, research Center E3S, Morocco
Article Info
Article history:
Received May 31, 2018
Revised Nov 15, 2018
Accepted Nov 23, 2018
Keywords:
Cognitive radio network
Jain’s equity index
Scheduler
Channels allocation
ABSTRACT
The present paper addresses the equity issue among the secondary users in a cognitive
radio network. After using a multi scheduler algorithm and a fairness metric namely
Jain’s Equity Index; we enhance the equity between the secondary users’ transfer rates
by 0.64 in average, relative to a previous work.
Copyright c 2019 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Said Lakhal,
Mohammadia School of Engineering, Mohammed 5 University in Rabat,
ERSC formerly known as LEC, research Center E3S,
Mohammadia School of Engineering, Ibn Sina Avenue, B.P 765, Agdal, Rabat, Morocco.
Email: said.lakhal.rech@gmail.com
1. INTRODUCTION
In a cognitive radio network (CRN) [1], the primary users (PUs) have priority to use the spectra,
without privatization; while the secondary users (SUs), wait the cessation of activities of some PUs, for trans-
mitting data. The design of CRN executes four functions, by using one of four techniques, in the aims to reach
at some objectives. These functions are called in the following order [2, 3, 4]: spectrum sensing, spectrum
management, spectrum mobility and spectrum sharing [5, 6, 7]. The Auctions, Game theory, Markovian queu-
ing model and Multi-agent systems (MAS) represent the famous used techniques for modeling a CRN [8, 9],
all to achieve some objectives, characterizing the performance of a CRN. These aims are expressed in terms
of some quantities to maximize [10, 11, 12], such as: the equity, transfer rate and the spectrum use. These
requirements are also expressed in terms of other quantities to minimize, like: the energy consumption [13],
to extend the lifetime of electrical devices; the interference [14, 15], to enhance the quality and quantity of
transmission [8, 9]. The Figure 1 illustrates altogether the CRN functions, techniques, and objectives.
The SUs’ packet transmission phase begins as soon as some channels are released by the PUs. Each of
these SUs seeks to be the first to transmit. As a result, conflicts are created and the network can be blocked, as
well as no licensed user will be able to send their data. In front of this situation, the installation of a scheduler
becomes essential, to manage the channel allocation for different SUs, based on performance criteria whose
the equity represents an important component.
This scheduler must take into consideration the way of packet transmission and the properties of the
used equity metric. The way is explicit by the distribution of SUs on the free channels according to the time
slots, and the properties of the metric are four: population and Scale independence, boundedness as well as
Continuity. The authors of [6, 13] addressed the equity issues, based on a metric measurement. In the two
works, the above properties are not mentioned as well as the way of the packet forwarding was not clarified.
In [5], the authors studied the equity by using the JEI as a metric, which satisfied the four properties, but
Journal homepage: http://iaescore.com/journals/index.php/IJECE
2058 Ì ISSN: 2088-8708
they did not make a comparison with another work also they treated the groups of SUs rather than the SUs
themselves. In [7, 16], the authors used one channel transmission. In [7], the standard deviation is adopted
as metric, which not satisfies the above four properties. In [16], the single channel transmission decreases the
equity, despite the consideration of the JEI as a metric. In our present work, we take advantage of the benefits
of these works, and we improve them to remove their limitations. Explicitly, on one hand, we implement the
multi scheduler algorithm in a multi channel network, to produce the scheduling chain. On the other hand, we
use JEI as a metric, since it satisfies the four properties. As a result, we improve equity by an average of 0.64
for previous work.
Figure 1. The functions, objectives and techniques of CRN
The rest of this paper is structured as follows: Section 2 discusses some related works and our contri-
butions. Section 3 exposes our approach. We present the experimental results in section 4, and we conclude in
section 5.
2. SCHEDULING AND EQUITY CONCEPT: A LITERATURE REVIEW
2.1. Scheduling
The SUs and their packets appear randomly on the CRN. They require the installation of a sched-
uler, able to managing this flow. This scheduler can be implemented in software or hardware platform.
It targets multiple purposes, depending on the priorities and constraints. For example: the priorities can be
expressed by the maximization of throughput or equity, while the constraints can be represented by the network
infrastructure and architecture. Several previous works treated the throughput maximization problem [11, 17].
Based on constant input and output rates of queues [11], the authors exposed an opportunistic scheduler to
enhance the SUs’ transmission rates. By referring to the first-difference filter clustering and correlation based
PU modeling [17], the authors exposed a QoS-based spectrum coordinator for the CR user cohabitation in or-
der to achieve high throughput and fairness. In addition, the equity criterion between the SUs’ transfer rates
attracted much attention of researchers [13, 18, 5, 7]. So, by taking into account: the current and prior history
of user experience, as well as the respect of QoS [13], the authors proposed a fairness approach, by using the
JEI. Their aims are to determine the optimal power and rate distribution choices for each SU, while maintaining
the fairness across all SUs. In other equity study [18], the authors presented a resource allocation algorithm, in
order to maximize the fairness. They used a proportional fairness constraint, to assure that each SU can achieve
a required data rate, with QOS guarantees.
Certainly, the adopted architecture affects the network performance. In this regard, we can distin-
guish between two major architectures: distributed [19, 20, 21] and centralized [22, 7, 5, 19]. Both architec-
tures are considered in [19]. The authors proposed an incentive-aware spectrum sharing scheme, for taking in
IJECE, Vol. 9, No. 3, June 2019 : 2057 – 2063
IJECE ISSN: 2088-8708 Ì 2059
the advantages of these two architectures, and overcoming their weaknesses. The distributed aspect requires
no central control entities, which can independently be implemented within a distributed spectrum market.
By cons, the centralized aspect assigns the socially optimal contracts for all PUs and SUs, for attaining the eco-
nomic robustness. In [20], the authors proposed a distributed clustering algorithm based on the soft-constraint
affinity propagation message passing model (DCSCAP). So, without depending on predefined common control
channel (CCC), DCSCAP relies on the distributed message passing among the SUs, through their available
channels, for applying the algorithm on large scale of networks. In a centralized architecture, the authors
of [22] proposed a hybrid spectrum sensing method, after creating one of the most trusted spectrums sensing
mechanism. The suggested model showed an improvement after comparison with various spectrum sensing
methodologies.
Figure 2. The operating of the mono-scheduler and multi-scheduler algorithms
2.2. Principles of the mono and multi scheduler algorithms
In [7], the authors implemented a first algorithm, namely mono-scheduler, to assign the only free
channel to different SUs. This algorithm produced a Scheduling String (SS) and used the standard deviation as
a metric for evaluating the fairness among the groups of SUs. Its complexity is of order 2, in terms of the total
number of packets. The same authors proposed in [5] another algorithm, as an extension of the first, namely
multi-scheduler, with a complexity of order 3. This second version improved the mono-scheduler in terms of
the number of the free used channels. In the same paper, they used the SS, the States matrix noted S, and the
JEI to affect the free channels to the SUs, based on the equity measure, between the groups of SUs. Both [5, 7],
considered the fairness among the groups of SUs, but not between the SUs themselves.
Because of the importance of these two algorithms, i.e. mono-scheduler and multi-scheduler, in the
present work; we propose to explain the operating principles. To do this, we consider an example of CRN
containing:
(i) Two groups of SUs: G1 and G2, such as: G1 has two SUs: SU11 and SU12, each one has three packets;
while G2 has four SUs: SU21, SU22, SU23 and SU24; with two packets for each one as shown in Figure
2;
(ii) Eight for both: number of PUs and that of channels;
After the application of the mono-scheduler algorithm, we obtained: SS = (G1, 1)(G2, 1)(G1, 2)(G2, 1). The
first component (G1, 1) of SS signifies that G1 transmits one line of packets. This line contains two packets,
because G1 has two SUs. The second component(G2, 1) indicates that after the transmission of the first line of
G1, G2 transmits one line, which contains four packets, since G2 has four SUs, and so on. On the other hand,
the application of the multi-scheduler algorithm took two arguments: SS and S. This last indicates the state
of each channel, during each time slot. To simplify the study, we considered that, the channels have the same
capacity. In this case, we were interested only, in the number of the free channels during each time slot, while
all channels operated in the same manner. Therefore, S becomes a row vector, containing in each component,
the number of the free channels, during a given time slot. Then, for the example illustrated in Figure 2, we can
write: S = (3, 2, 3, 4, 3, 2, 1, 5)T
. After applying the multi-scheduler algorithm for such example, we could
distribute the packets, on the free channels, as shown in Figure 2.
In [16], the authors treated the fairness between the transfer rates of SUs, rather than that between the transfer
rates of groups [5, 7]. They are two Contributions of the present paper:
Equity-based free channels assignment for secondary... (Said Lakhal)
2060 Ì ISSN: 2088-8708
(i) Application of the multi-scheduler algorithm [5], for treating the SUs’ transfer rates rather than that of
groups.
(ii) Enhancement of the SUs’ fairness by 0.65, relative to [16].
2.3. Equity concept
In this work, we are interested in calculating the equity between the transfer rates of the SUs, after the
application of a scheduler algorithm. In the literature, several works have treated the fairness computation, i.e.
fairness metric, among the components of a vector. These works have also studied the properties of this metric.
Let x = (x1, ., xi, ., xn)T
be a vector in Rn
+, with homogeneous components in terms of measurement unit.
In [23], the authors distinguished between four properties of the fairness metric: P1, P2, P3 and P4.
P1: Population size independence: The index should be applicable to any number of components of x, finite
or infinite.
P2: Scale and metric independence: The metric should be independent of the scale of all components.
P3: Boundedness: The index should be bounded by two finite values.
P4: Continuity: Any slight change in this metric value, should show a change of at least one component value.
They proposed a new fairness metric namely JEI, which verifies together these four properties:
JEI(x) =
n
i=1
xi
2
× n
n
i=1
x2
i
−1
.
A value of JEI(x) close to 1 expresses that most of x components are close to their average. By
cons, if they are dispersed around their average, JEI(x) will be close to 0.
3. MODELING THE EQUITY
They are many parameters, which define the modeling of equity. Before beginning this formulation,
we prefer to expose these parameters in Table 2.
Table 1. Symbols and Their Meanings
Symbols Meanings
m, n Number of PUs or channels, and number of current SUs, resp.
MaxSUs, qj, MaxPack Max number of SUs, size queue of SUj, Max number of packets in a queue, resp.
P, Q, e Vector containing the size queue of each SU, vector defined based on P, size of Q, resp.
gj, G, Sif Number of SUs in group Gj, vector of all gj, state of channel i during time slot f, resp.
uf , u, s Number of free channels during time slot f, vector of all values of uf , size of u, resp.
QGi, ti, ri Number of packets of Gi, time for sending all packets of Gi, transfer rate of Gi, resp.
tij, r∗
ij Time spent to transmit all packets of SUij, transfer rate of SUij, resp.
P = (q1, ., qj, ., qn)T
(1)
We note that during a time fraction, a SU may send one packet or not. We organize the SUs by groups [7],
according to the number of packets; such as, a given group, contains all SUs who have the same number of
packets. To do this, we define a new vector Q based on vector P:
Q = (q1, ., qj, ., qe)T
, qi = qj, ∀(i = j, j) ∈ {1, ., e}
2
, (e ≤ n), G = (g1, ., gj, ., ge)T
(2)
We have m channels, and during each time slot, we can find a certain number of free channels. Like that, the
state of the CRN is defined by the states of all channels. These states are organized in the matrix S:
Sif =



1 if channel i is free,
during time slot f;
0 if not.
(3)
The number of free channels during a time slot is stored in vector: u = (u1, ., uf , ., us)T
(4)
IJECE, Vol. 9, No. 3, June 2019 : 2057 – 2063
IJECE ISSN: 2088-8708 Ì 2061
During the time slot f, we have uf free channels: uf =
m
i=1
Sif , f ∈ {1, ., s}
(5)
The total number of packets of the group Gi in noted QGi. It is obtained by summing the number of packets
of all
SUs form group Gi. By using (2), we can write: QGi = qi ×gi
(6)
To calculate the transfer rates of groups and those of SUs, we must know the necessary number of passing time
slots, for sending all packets.
Let ti and ri be the necessary number of passing time slots for sending all packets and the transfer rate of Gi,
resp.
ri = QGi × t−1
i = (qi × gi) × t−1
i (7)
Let SUij be the jth
SU of Gi. We consider that SUij needs tij time slots, for sending all his packets. So, the
transfer rate r∗
ij of SUij, will be given by:
r∗
ij = qi × t−1
ij (8)
Since SUij is a member of Gi. Then, this last completes the transmission of his packets, only after the trans-
mission of all packets of his SUs. Thus, we have the following inequality:
ti − (gi − 1) ≤ tij ≤ ti, ∀j ∈ {1, ., gi} (9)
Let r and r∗
be the vectors containing all transfer rates, of all groups and SUs, respectively.
r = (r1, ., ri, ., re)T
, r∗
= (r∗
11, ., r∗
1g1
; .; r∗
i1, ., r∗
igi
; .; r∗
e1, ., r∗
ege
)T
(10)
JEI(q) =
n
i=1
qi
2
× n
n
i=1
q2
i
−1
, JEI(QG) =
e
i=1
QGi
2
× e
e
i=1
QG2
i
−1
(11)
JEI(r) =
e
i=1
ri
2
× e
e
i=1
r2
i
−1
, JEI(r∗
) =
e
i=1
gi
k=1
r∗
ik
2
× n
e
i=1
gi
k=1
r∗
ik
2
−1
. (12)
4. EXPERIMENTATIONS
We consider four scenarios, containing two, three, four and five groups of SUs, respectively. After,
we apply the mono and multi-scheduler algorithms. As a result, we deduct the JEI of the users’ rates, which
are exposed in Figures 3 and 4.
In all the Figures, we can easily notice that the equities obtained by using our model are very important
compared to those of the model [16]. On average, this difference reaches 0.64, which is explained by the parallel
transmission of several packets via several channels in our model. As a result, the users’ transfer rates are very
close and the equities are very important. By cons, the model of [16] used a single transmission channel,
therefore, the standard deviation of the users’ transfer rates is very important; then, the equities are very low.
Figure 3. Groups’ equities, obtained by using the two models
Equity-based free channels assignment for secondary... (Said Lakhal)
2062 Ì ISSN: 2088-8708
Figure 4. SUs’ equities, obtained by using the two models
5. CONCLUSION
In this work, we have improved the equity of a previous work, by using a new model. The performance
improvement can be explained by the increase of the number of used channels processed by the multi scheduler
algorithm. Without forgetting the importance of the monoscheduler, which resides in the establishment of the
scheduling chain.
REFERENCES
[1] Mitola J., ”Cognitive radio: an integrated agent architecture for software defined radio,” Ph. D. dissertation,
Royal Institute of Technology (KTH), Sweden, pp. 8-13, 2000.
[2] I.Akyildiz et, al., ”NeXt generation/ dynamic spectrum access/ cognitive radio wireless networks A survey,”
Computer Networks, vol. 50, pp. 2127-2159, 2006.
[3] A.Khan et, al., ”Research Challenges of Cognitive Radio,” IJERT, vol. 1, 2012.
[4] P.Bhattacharya et, al., ”Smart Radio Spectrum Management for Cognitive Radio,” arXiv:1109.0257 [cs],
2011.
[5] A.Idrissi and S.Lakhal, ”Equity between secondary users in a cognitive radio network,” Wseas, vol. 13, pp.
90-98, 2014.
[6] Y.Z.S.Maharjan et, al., ”Distributed spectrum sensing in cognitive radio networks with fairness considera-
tion: Efficiency of correlated equilibrium,” Mobile Adhoc and Sensor Systems, pp. 540-549, 2011.
[7] A.Idrissi and S.Lakhal, ”An algorithm for fairness between secondary users in cognitive radio network,”
JATIT, vol. 8, 2013.
[8] A.Garhwal and P.Bhattacharya, ”A suervey on dynamic spectrum acces techniques for cognitive ra-
dio,”arXiv preprint arXiv, pp. 1201-1964, 2012.
[9] B.Benmammar et, al. ”A survey on dynamic spectrum acces techniques in cognitive radio net-
works,”IJCNIS, vol. 5, pp. 68-79, 2013.
[10] HT.Cheng and W.Zhuang, ”Simple channel sensing order in cognitive radio networks,”IEEE JSAC, vol.
29, pp. 676-688, 2011.
[11] R.Urgaonkar and M.Neely, ”Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio
Networks,” IEEE transactions on mobile computing”, vol. 8, pp. 766-777, 2009.
[12] S.Li et, al., ”Maximizing System Throughput by Cooperative Sensing in Cognitive Radio Networks,”
IEEE/ACM Transactions on Networking, vol. 22, pp. 1245-1256, 2014.
[13] L.Akter and B.Natarajan, ”Modeling Fairness in Resource Allocation for Secondary Users in a Competi-
tive Cognitive Radio Network,” Wireless Telecommunications Symposium IEEE, pp. 1-6, 2010.
[14] D.Damodaram and T.Venkateswarlu, ”Efficient Hardware Architecture for Cyclostationary Detec-
tor,”Bulletin of Electrical Engineering and Informatics, vol.5, no.3, pp. 340-346, 2016.
[15] E.A.S.Kang and R.Vig, ”Impact of Next Generation Cognitive Radio Network on the Wireless Green
Eco system through Signal and Interference Level based K Coverage Probability,”Indonesian Journal of
Electrical Engineering and Informatics (IJEEI), vol. 5, no.1, pp. 69-76, 2017.
[16] S.Lakhal and A.Idrissi., ”Queues management of secondary users in a cognitive radio network,” in
NGNS14, pp. 302-307,2014.
[17] C.Berk et, al., ”QoS-Aware User Cohabitation Coordinator in Cognitive Radio Networks,” IEEE Globe-
com, pp. 1356-1361, 2012.
[18] Y.Ma et, al., ”A Subcarrier-Pair Based Resource Allocation Scheme Using Proportional Fairness for Co-
IJECE, Vol. 9, No. 3, June 2019 : 2057 – 2063
IJECE ISSN: 2088-8708 Ì 2063
operative OFDM-Based Cognitive Radio Networks,” Sensors, vol. 13, pp. 10306-10332, 2013.
[19] Q.Liang et, al., ”A distributed centralized scheme for Short and Long Term Spectrum Sharing with a
Random Leader in Cognitive Radio Networks,”IEEE JSAC, vol. 30, pp. 2274-2284, 2012;
[20] F.Yao et, al., ”Distributed Clustering in Cognitive Radio Ad Hoc Networks Using Soft-Constraint Affinity
Propagation,” Radioengineering, 2012.
[21] S.Maharjan et, al., ”Distributed Spectrum Sensing in Cognitive Radio Networks with Fairness Consid-
eration, Efficiency of Correlated Equilibrium,” In IEEE International Conference on Mobile Ad-Hoc and
Sensor Systems, pp. 540-549, 2011:
[22] A.S.Khobragade and R.D.Raut, ”Hybrid Spectrum Sensing Method for Cognitive Radio,” International
Journal of Electrical and Computer Engineering (IJECE), vol.7, no. 5, pp. 2683-269551, 2017.
[23] Jain R et, al., ”A Quantitive Measure of Fairness and Discrimination for Resource Allocation in Shared
Computer Systems,” Eastern Research Laboratory, Digital Equipment Corporation Hudson, vol. 38, 1984.
BIOGRAPHIES OF AUTHORS
S. Lakhal obtained the diploma of application engineer in computer sciences in 1998, from
the University Sidi Mohamed Ben Abdelah, Fes, Morocco, M.Sc. degree in modelization in
2006, from Mohammadia School of Engineering. He is currently a researcher at the Labora-
tory of Electronics and Telecommunications, Mohammadia School of Engineers (EMI), Rabat,
Morocco. His current research interests are Computing, Radio cognitive, Algorithmic and com-
plexity, Modelization.
Z. Guennoun received his engineering degree in Electronics and Telecommunications from the
Electronics and Electrical Montefiore Institute, ULG Liege, Belgium in 1987; his M.Sc. degree in
Communication Systems from the EMI School of Engineering, Rabat, Morocco in 1993; and his
PhD degree from the same school in 1996. He visited the Centre for Communication Research
(CCR) in Bristol University, UK, during the period of 1990-1994 to prepare a split PhD. Dur-
ing 1988-1996 he worked as an Assistant Lecturer in the EMI School of engineering, and from
1996 he is working in the same school as a Professor Lecturer. His fields of interest are digital
signal processing, error control coding, speech and image processing. Currently in charge of the
laboratory of Electronics and Telecommunications (LEC) at EMI. IEEE member since 1990; and
member of the Moroccan IEEE section executive committee.
Equity-based free channels assignment for secondary... (Said Lakhal)

More Related Content

What's hot

AC-Based Differential Evolution Algorithm for Dynamic Transmission Expansion ...
AC-Based Differential Evolution Algorithm for Dynamic Transmission Expansion ...AC-Based Differential Evolution Algorithm for Dynamic Transmission Expansion ...
AC-Based Differential Evolution Algorithm for Dynamic Transmission Expansion ...TELKOMNIKA JOURNAL
 
USAGE BASED COST ALLOCATION TECHNIQUE FOR EHV NETWORKS USING NON-LINEAR UTILI...
USAGE BASED COST ALLOCATION TECHNIQUE FOR EHV NETWORKS USING NON-LINEAR UTILI...USAGE BASED COST ALLOCATION TECHNIQUE FOR EHV NETWORKS USING NON-LINEAR UTILI...
USAGE BASED COST ALLOCATION TECHNIQUE FOR EHV NETWORKS USING NON-LINEAR UTILI...ELELIJ
 
GPS Enabled Energy Efficient Routing for Manet
GPS Enabled Energy Efficient Routing for ManetGPS Enabled Energy Efficient Routing for Manet
GPS Enabled Energy Efficient Routing for ManetCSCJournals
 
Incorporate ACO routing algorithm and mobile sink in wireless sensor networks
Incorporate ACO routing algorithm and mobile sink in wireless sensor networks Incorporate ACO routing algorithm and mobile sink in wireless sensor networks
Incorporate ACO routing algorithm and mobile sink in wireless sensor networks IJECEIAES
 
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs cscpconf
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
 
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...journalBEEI
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
 
Performance Evaluation of Consumed Energy-Type-Aware Routing (CETAR) For Wire...
Performance Evaluation of Consumed Energy-Type-Aware Routing (CETAR) For Wire...Performance Evaluation of Consumed Energy-Type-Aware Routing (CETAR) For Wire...
Performance Evaluation of Consumed Energy-Type-Aware Routing (CETAR) For Wire...ijwmn
 
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
 
IMPROVEMENT of MULTIPLE ROUTING BASED on FUZZY CLUSTERING and PSO ALGORITHM I...
IMPROVEMENT of MULTIPLE ROUTING BASED on FUZZY CLUSTERING and PSO ALGORITHM I...IMPROVEMENT of MULTIPLE ROUTING BASED on FUZZY CLUSTERING and PSO ALGORITHM I...
IMPROVEMENT of MULTIPLE ROUTING BASED on FUZZY CLUSTERING and PSO ALGORITHM I...IJCNCJournal
 
Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...IJCNCJournal
 
MPR selection to the OLSR quality of service in MANET using minmax algorithm
MPR selection to the OLSR quality of service in MANET using minmax algorithmMPR selection to the OLSR quality of service in MANET using minmax algorithm
MPR selection to the OLSR quality of service in MANET using minmax algorithmIJECEIAES
 
Optimum Network Reconfiguration using Grey Wolf Optimizer
Optimum Network Reconfiguration using Grey Wolf OptimizerOptimum Network Reconfiguration using Grey Wolf Optimizer
Optimum Network Reconfiguration using Grey Wolf OptimizerTELKOMNIKA JOURNAL
 
OPTIMIZATION OF A TWO-HOP NETWORK WITH ENERGY CONFERENCING RELAYS
OPTIMIZATION OF A TWO-HOP NETWORK WITH ENERGY CONFERENCING RELAYSOPTIMIZATION OF A TWO-HOP NETWORK WITH ENERGY CONFERENCING RELAYS
OPTIMIZATION OF A TWO-HOP NETWORK WITH ENERGY CONFERENCING RELAYSijwmn
 
Kalman Filter Estimation of Impedance Parameters for Medium Transmission Line
Kalman Filter Estimation of Impedance Parameters for Medium Transmission LineKalman Filter Estimation of Impedance Parameters for Medium Transmission Line
Kalman Filter Estimation of Impedance Parameters for Medium Transmission LineTELKOMNIKA JOURNAL
 
Minimization of Energy Consumption using EPAR-DSR Protocol in Manet
Minimization of Energy Consumption using EPAR-DSR Protocol in ManetMinimization of Energy Consumption using EPAR-DSR Protocol in Manet
Minimization of Energy Consumption using EPAR-DSR Protocol in ManetIRJET Journal
 
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...IJCNCJournal
 

What's hot (20)

AC-Based Differential Evolution Algorithm for Dynamic Transmission Expansion ...
AC-Based Differential Evolution Algorithm for Dynamic Transmission Expansion ...AC-Based Differential Evolution Algorithm for Dynamic Transmission Expansion ...
AC-Based Differential Evolution Algorithm for Dynamic Transmission Expansion ...
 
USAGE BASED COST ALLOCATION TECHNIQUE FOR EHV NETWORKS USING NON-LINEAR UTILI...
USAGE BASED COST ALLOCATION TECHNIQUE FOR EHV NETWORKS USING NON-LINEAR UTILI...USAGE BASED COST ALLOCATION TECHNIQUE FOR EHV NETWORKS USING NON-LINEAR UTILI...
USAGE BASED COST ALLOCATION TECHNIQUE FOR EHV NETWORKS USING NON-LINEAR UTILI...
 
GPS Enabled Energy Efficient Routing for Manet
GPS Enabled Energy Efficient Routing for ManetGPS Enabled Energy Efficient Routing for Manet
GPS Enabled Energy Efficient Routing for Manet
 
Incorporate ACO routing algorithm and mobile sink in wireless sensor networks
Incorporate ACO routing algorithm and mobile sink in wireless sensor networks Incorporate ACO routing algorithm and mobile sink in wireless sensor networks
Incorporate ACO routing algorithm and mobile sink in wireless sensor networks
 
RoutingMetrics_PHD_2006
RoutingMetrics_PHD_2006RoutingMetrics_PHD_2006
RoutingMetrics_PHD_2006
 
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
 
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
 
Performance Evaluation of Consumed Energy-Type-Aware Routing (CETAR) For Wire...
Performance Evaluation of Consumed Energy-Type-Aware Routing (CETAR) For Wire...Performance Evaluation of Consumed Energy-Type-Aware Routing (CETAR) For Wire...
Performance Evaluation of Consumed Energy-Type-Aware Routing (CETAR) For Wire...
 
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
 
IMPROVEMENT of MULTIPLE ROUTING BASED on FUZZY CLUSTERING and PSO ALGORITHM I...
IMPROVEMENT of MULTIPLE ROUTING BASED on FUZZY CLUSTERING and PSO ALGORITHM I...IMPROVEMENT of MULTIPLE ROUTING BASED on FUZZY CLUSTERING and PSO ALGORITHM I...
IMPROVEMENT of MULTIPLE ROUTING BASED on FUZZY CLUSTERING and PSO ALGORITHM I...
 
Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...
 
MPR selection to the OLSR quality of service in MANET using minmax algorithm
MPR selection to the OLSR quality of service in MANET using minmax algorithmMPR selection to the OLSR quality of service in MANET using minmax algorithm
MPR selection to the OLSR quality of service in MANET using minmax algorithm
 
Optimum Network Reconfiguration using Grey Wolf Optimizer
Optimum Network Reconfiguration using Grey Wolf OptimizerOptimum Network Reconfiguration using Grey Wolf Optimizer
Optimum Network Reconfiguration using Grey Wolf Optimizer
 
OPTIMIZATION OF A TWO-HOP NETWORK WITH ENERGY CONFERENCING RELAYS
OPTIMIZATION OF A TWO-HOP NETWORK WITH ENERGY CONFERENCING RELAYSOPTIMIZATION OF A TWO-HOP NETWORK WITH ENERGY CONFERENCING RELAYS
OPTIMIZATION OF A TWO-HOP NETWORK WITH ENERGY CONFERENCING RELAYS
 
Kalman Filter Estimation of Impedance Parameters for Medium Transmission Line
Kalman Filter Estimation of Impedance Parameters for Medium Transmission LineKalman Filter Estimation of Impedance Parameters for Medium Transmission Line
Kalman Filter Estimation of Impedance Parameters for Medium Transmission Line
 
Minimization of Energy Consumption using EPAR-DSR Protocol in Manet
Minimization of Energy Consumption using EPAR-DSR Protocol in ManetMinimization of Energy Consumption using EPAR-DSR Protocol in Manet
Minimization of Energy Consumption using EPAR-DSR Protocol in Manet
 
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
 
L0947075
L0947075L0947075
L0947075
 

Similar to Equity-Based free channels assignment for secondary users in a cognitive radio network

Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...IJECEIAES
 
A novel k-means powered algorithm for an efficient clustering in vehicular ad...
A novel k-means powered algorithm for an efficient clustering in vehicular ad...A novel k-means powered algorithm for an efficient clustering in vehicular ad...
A novel k-means powered algorithm for an efficient clustering in vehicular ad...IJECEIAES
 
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...IJCNCJournal
 
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...IJCNCJournal
 
2269-2847-1-SM.pdf
2269-2847-1-SM.pdf2269-2847-1-SM.pdf
2269-2847-1-SM.pdfssuser47c279
 
JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...
JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...
JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...IEEEGLOBALSOFTTECHNOLOGIES
 
Distributed web systems performance forecasting
Distributed web systems performance forecastingDistributed web systems performance forecasting
Distributed web systems performance forecastingIEEEFINALYEARPROJECTS
 
CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...
CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...
CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...ijassn
 
CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...
CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...
CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...ijassn
 
A_C_RAN_Architecture_for_LTE_Control_Sig.pdf
A_C_RAN_Architecture_for_LTE_Control_Sig.pdfA_C_RAN_Architecture_for_LTE_Control_Sig.pdf
A_C_RAN_Architecture_for_LTE_Control_Sig.pdfsehat maruli
 
Throughput in cooperative wireless networks
Throughput in cooperative wireless networksThroughput in cooperative wireless networks
Throughput in cooperative wireless networksjournalBEEI
 
An Energy Efficient Mobile Sink Based Mechanism for WSNs.pdf
An Energy Efficient Mobile Sink Based Mechanism for WSNs.pdfAn Energy Efficient Mobile Sink Based Mechanism for WSNs.pdf
An Energy Efficient Mobile Sink Based Mechanism for WSNs.pdfMohammad Siraj
 
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...Novel approach for hybrid MAC scheme for balanced energy and transmission in ...
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...IJECEIAES
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
 
Analytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTEAnalytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTESpiros Louvros
 
Routing Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachRouting Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachEswar Publications
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKS
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKSPERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKS
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKScscpconf
 
Performance analysis of resource
Performance analysis of resourcePerformance analysis of resource
Performance analysis of resourcecsandit
 

Similar to Equity-Based free channels assignment for secondary users in a cognitive radio network (20)

Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...
 
A novel k-means powered algorithm for an efficient clustering in vehicular ad...
A novel k-means powered algorithm for an efficient clustering in vehicular ad...A novel k-means powered algorithm for an efficient clustering in vehicular ad...
A novel k-means powered algorithm for an efficient clustering in vehicular ad...
 
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
 
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
 
2269-2847-1-SM.pdf
2269-2847-1-SM.pdf2269-2847-1-SM.pdf
2269-2847-1-SM.pdf
 
JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...
JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...
JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...
 
Distributed web systems performance forecasting
Distributed web systems performance forecastingDistributed web systems performance forecasting
Distributed web systems performance forecasting
 
CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...
CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...
CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...
 
CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...
CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...
CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...
 
A_C_RAN_Architecture_for_LTE_Control_Sig.pdf
A_C_RAN_Architecture_for_LTE_Control_Sig.pdfA_C_RAN_Architecture_for_LTE_Control_Sig.pdf
A_C_RAN_Architecture_for_LTE_Control_Sig.pdf
 
Throughput in cooperative wireless networks
Throughput in cooperative wireless networksThroughput in cooperative wireless networks
Throughput in cooperative wireless networks
 
An Energy Efficient Mobile Sink Based Mechanism for WSNs.pdf
An Energy Efficient Mobile Sink Based Mechanism for WSNs.pdfAn Energy Efficient Mobile Sink Based Mechanism for WSNs.pdf
An Energy Efficient Mobile Sink Based Mechanism for WSNs.pdf
 
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...Novel approach for hybrid MAC scheme for balanced energy and transmission in ...
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
 
Analytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTEAnalytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTE
 
C4O: chain-based cooperative clustering using coati optimization algorithm i...
C4O: chain-based cooperative clustering using coati  optimization algorithm i...C4O: chain-based cooperative clustering using coati  optimization algorithm i...
C4O: chain-based cooperative clustering using coati optimization algorithm i...
 
Routing Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachRouting Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient Approach
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKS
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKSPERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKS
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKS
 
Performance analysis of resource
Performance analysis of resourcePerformance analysis of resource
Performance analysis of resource
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 

Equity-Based free channels assignment for secondary users in a cognitive radio network

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 9, No. 3, June 2019, pp. 2057∼2063 ISSN: 2088-8708, DOI: 10.11591/ijece.v9i3.pp2057-2063 Ì 2057 Equity-based free channels assignment for secondary users in a cognitive radio network Said Lakhal1 , Zouhair Guennoun2 1 Mohammadia School of Engineering, Mohammed 5 University in Rabat, Morocco 2 ERSC formerly known as LEC, research Center E3S, Morocco Article Info Article history: Received May 31, 2018 Revised Nov 15, 2018 Accepted Nov 23, 2018 Keywords: Cognitive radio network Jain’s equity index Scheduler Channels allocation ABSTRACT The present paper addresses the equity issue among the secondary users in a cognitive radio network. After using a multi scheduler algorithm and a fairness metric namely Jain’s Equity Index; we enhance the equity between the secondary users’ transfer rates by 0.64 in average, relative to a previous work. Copyright c 2019 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Said Lakhal, Mohammadia School of Engineering, Mohammed 5 University in Rabat, ERSC formerly known as LEC, research Center E3S, Mohammadia School of Engineering, Ibn Sina Avenue, B.P 765, Agdal, Rabat, Morocco. Email: said.lakhal.rech@gmail.com 1. INTRODUCTION In a cognitive radio network (CRN) [1], the primary users (PUs) have priority to use the spectra, without privatization; while the secondary users (SUs), wait the cessation of activities of some PUs, for trans- mitting data. The design of CRN executes four functions, by using one of four techniques, in the aims to reach at some objectives. These functions are called in the following order [2, 3, 4]: spectrum sensing, spectrum management, spectrum mobility and spectrum sharing [5, 6, 7]. The Auctions, Game theory, Markovian queu- ing model and Multi-agent systems (MAS) represent the famous used techniques for modeling a CRN [8, 9], all to achieve some objectives, characterizing the performance of a CRN. These aims are expressed in terms of some quantities to maximize [10, 11, 12], such as: the equity, transfer rate and the spectrum use. These requirements are also expressed in terms of other quantities to minimize, like: the energy consumption [13], to extend the lifetime of electrical devices; the interference [14, 15], to enhance the quality and quantity of transmission [8, 9]. The Figure 1 illustrates altogether the CRN functions, techniques, and objectives. The SUs’ packet transmission phase begins as soon as some channels are released by the PUs. Each of these SUs seeks to be the first to transmit. As a result, conflicts are created and the network can be blocked, as well as no licensed user will be able to send their data. In front of this situation, the installation of a scheduler becomes essential, to manage the channel allocation for different SUs, based on performance criteria whose the equity represents an important component. This scheduler must take into consideration the way of packet transmission and the properties of the used equity metric. The way is explicit by the distribution of SUs on the free channels according to the time slots, and the properties of the metric are four: population and Scale independence, boundedness as well as Continuity. The authors of [6, 13] addressed the equity issues, based on a metric measurement. In the two works, the above properties are not mentioned as well as the way of the packet forwarding was not clarified. In [5], the authors studied the equity by using the JEI as a metric, which satisfied the four properties, but Journal homepage: http://iaescore.com/journals/index.php/IJECE
  • 2. 2058 Ì ISSN: 2088-8708 they did not make a comparison with another work also they treated the groups of SUs rather than the SUs themselves. In [7, 16], the authors used one channel transmission. In [7], the standard deviation is adopted as metric, which not satisfies the above four properties. In [16], the single channel transmission decreases the equity, despite the consideration of the JEI as a metric. In our present work, we take advantage of the benefits of these works, and we improve them to remove their limitations. Explicitly, on one hand, we implement the multi scheduler algorithm in a multi channel network, to produce the scheduling chain. On the other hand, we use JEI as a metric, since it satisfies the four properties. As a result, we improve equity by an average of 0.64 for previous work. Figure 1. The functions, objectives and techniques of CRN The rest of this paper is structured as follows: Section 2 discusses some related works and our contri- butions. Section 3 exposes our approach. We present the experimental results in section 4, and we conclude in section 5. 2. SCHEDULING AND EQUITY CONCEPT: A LITERATURE REVIEW 2.1. Scheduling The SUs and their packets appear randomly on the CRN. They require the installation of a sched- uler, able to managing this flow. This scheduler can be implemented in software or hardware platform. It targets multiple purposes, depending on the priorities and constraints. For example: the priorities can be expressed by the maximization of throughput or equity, while the constraints can be represented by the network infrastructure and architecture. Several previous works treated the throughput maximization problem [11, 17]. Based on constant input and output rates of queues [11], the authors exposed an opportunistic scheduler to enhance the SUs’ transmission rates. By referring to the first-difference filter clustering and correlation based PU modeling [17], the authors exposed a QoS-based spectrum coordinator for the CR user cohabitation in or- der to achieve high throughput and fairness. In addition, the equity criterion between the SUs’ transfer rates attracted much attention of researchers [13, 18, 5, 7]. So, by taking into account: the current and prior history of user experience, as well as the respect of QoS [13], the authors proposed a fairness approach, by using the JEI. Their aims are to determine the optimal power and rate distribution choices for each SU, while maintaining the fairness across all SUs. In other equity study [18], the authors presented a resource allocation algorithm, in order to maximize the fairness. They used a proportional fairness constraint, to assure that each SU can achieve a required data rate, with QOS guarantees. Certainly, the adopted architecture affects the network performance. In this regard, we can distin- guish between two major architectures: distributed [19, 20, 21] and centralized [22, 7, 5, 19]. Both architec- tures are considered in [19]. The authors proposed an incentive-aware spectrum sharing scheme, for taking in IJECE, Vol. 9, No. 3, June 2019 : 2057 – 2063
  • 3. IJECE ISSN: 2088-8708 Ì 2059 the advantages of these two architectures, and overcoming their weaknesses. The distributed aspect requires no central control entities, which can independently be implemented within a distributed spectrum market. By cons, the centralized aspect assigns the socially optimal contracts for all PUs and SUs, for attaining the eco- nomic robustness. In [20], the authors proposed a distributed clustering algorithm based on the soft-constraint affinity propagation message passing model (DCSCAP). So, without depending on predefined common control channel (CCC), DCSCAP relies on the distributed message passing among the SUs, through their available channels, for applying the algorithm on large scale of networks. In a centralized architecture, the authors of [22] proposed a hybrid spectrum sensing method, after creating one of the most trusted spectrums sensing mechanism. The suggested model showed an improvement after comparison with various spectrum sensing methodologies. Figure 2. The operating of the mono-scheduler and multi-scheduler algorithms 2.2. Principles of the mono and multi scheduler algorithms In [7], the authors implemented a first algorithm, namely mono-scheduler, to assign the only free channel to different SUs. This algorithm produced a Scheduling String (SS) and used the standard deviation as a metric for evaluating the fairness among the groups of SUs. Its complexity is of order 2, in terms of the total number of packets. The same authors proposed in [5] another algorithm, as an extension of the first, namely multi-scheduler, with a complexity of order 3. This second version improved the mono-scheduler in terms of the number of the free used channels. In the same paper, they used the SS, the States matrix noted S, and the JEI to affect the free channels to the SUs, based on the equity measure, between the groups of SUs. Both [5, 7], considered the fairness among the groups of SUs, but not between the SUs themselves. Because of the importance of these two algorithms, i.e. mono-scheduler and multi-scheduler, in the present work; we propose to explain the operating principles. To do this, we consider an example of CRN containing: (i) Two groups of SUs: G1 and G2, such as: G1 has two SUs: SU11 and SU12, each one has three packets; while G2 has four SUs: SU21, SU22, SU23 and SU24; with two packets for each one as shown in Figure 2; (ii) Eight for both: number of PUs and that of channels; After the application of the mono-scheduler algorithm, we obtained: SS = (G1, 1)(G2, 1)(G1, 2)(G2, 1). The first component (G1, 1) of SS signifies that G1 transmits one line of packets. This line contains two packets, because G1 has two SUs. The second component(G2, 1) indicates that after the transmission of the first line of G1, G2 transmits one line, which contains four packets, since G2 has four SUs, and so on. On the other hand, the application of the multi-scheduler algorithm took two arguments: SS and S. This last indicates the state of each channel, during each time slot. To simplify the study, we considered that, the channels have the same capacity. In this case, we were interested only, in the number of the free channels during each time slot, while all channels operated in the same manner. Therefore, S becomes a row vector, containing in each component, the number of the free channels, during a given time slot. Then, for the example illustrated in Figure 2, we can write: S = (3, 2, 3, 4, 3, 2, 1, 5)T . After applying the multi-scheduler algorithm for such example, we could distribute the packets, on the free channels, as shown in Figure 2. In [16], the authors treated the fairness between the transfer rates of SUs, rather than that between the transfer rates of groups [5, 7]. They are two Contributions of the present paper: Equity-based free channels assignment for secondary... (Said Lakhal)
  • 4. 2060 Ì ISSN: 2088-8708 (i) Application of the multi-scheduler algorithm [5], for treating the SUs’ transfer rates rather than that of groups. (ii) Enhancement of the SUs’ fairness by 0.65, relative to [16]. 2.3. Equity concept In this work, we are interested in calculating the equity between the transfer rates of the SUs, after the application of a scheduler algorithm. In the literature, several works have treated the fairness computation, i.e. fairness metric, among the components of a vector. These works have also studied the properties of this metric. Let x = (x1, ., xi, ., xn)T be a vector in Rn +, with homogeneous components in terms of measurement unit. In [23], the authors distinguished between four properties of the fairness metric: P1, P2, P3 and P4. P1: Population size independence: The index should be applicable to any number of components of x, finite or infinite. P2: Scale and metric independence: The metric should be independent of the scale of all components. P3: Boundedness: The index should be bounded by two finite values. P4: Continuity: Any slight change in this metric value, should show a change of at least one component value. They proposed a new fairness metric namely JEI, which verifies together these four properties: JEI(x) = n i=1 xi 2 × n n i=1 x2 i −1 . A value of JEI(x) close to 1 expresses that most of x components are close to their average. By cons, if they are dispersed around their average, JEI(x) will be close to 0. 3. MODELING THE EQUITY They are many parameters, which define the modeling of equity. Before beginning this formulation, we prefer to expose these parameters in Table 2. Table 1. Symbols and Their Meanings Symbols Meanings m, n Number of PUs or channels, and number of current SUs, resp. MaxSUs, qj, MaxPack Max number of SUs, size queue of SUj, Max number of packets in a queue, resp. P, Q, e Vector containing the size queue of each SU, vector defined based on P, size of Q, resp. gj, G, Sif Number of SUs in group Gj, vector of all gj, state of channel i during time slot f, resp. uf , u, s Number of free channels during time slot f, vector of all values of uf , size of u, resp. QGi, ti, ri Number of packets of Gi, time for sending all packets of Gi, transfer rate of Gi, resp. tij, r∗ ij Time spent to transmit all packets of SUij, transfer rate of SUij, resp. P = (q1, ., qj, ., qn)T (1) We note that during a time fraction, a SU may send one packet or not. We organize the SUs by groups [7], according to the number of packets; such as, a given group, contains all SUs who have the same number of packets. To do this, we define a new vector Q based on vector P: Q = (q1, ., qj, ., qe)T , qi = qj, ∀(i = j, j) ∈ {1, ., e} 2 , (e ≤ n), G = (g1, ., gj, ., ge)T (2) We have m channels, and during each time slot, we can find a certain number of free channels. Like that, the state of the CRN is defined by the states of all channels. These states are organized in the matrix S: Sif =    1 if channel i is free, during time slot f; 0 if not. (3) The number of free channels during a time slot is stored in vector: u = (u1, ., uf , ., us)T (4) IJECE, Vol. 9, No. 3, June 2019 : 2057 – 2063
  • 5. IJECE ISSN: 2088-8708 Ì 2061 During the time slot f, we have uf free channels: uf = m i=1 Sif , f ∈ {1, ., s} (5) The total number of packets of the group Gi in noted QGi. It is obtained by summing the number of packets of all SUs form group Gi. By using (2), we can write: QGi = qi ×gi (6) To calculate the transfer rates of groups and those of SUs, we must know the necessary number of passing time slots, for sending all packets. Let ti and ri be the necessary number of passing time slots for sending all packets and the transfer rate of Gi, resp. ri = QGi × t−1 i = (qi × gi) × t−1 i (7) Let SUij be the jth SU of Gi. We consider that SUij needs tij time slots, for sending all his packets. So, the transfer rate r∗ ij of SUij, will be given by: r∗ ij = qi × t−1 ij (8) Since SUij is a member of Gi. Then, this last completes the transmission of his packets, only after the trans- mission of all packets of his SUs. Thus, we have the following inequality: ti − (gi − 1) ≤ tij ≤ ti, ∀j ∈ {1, ., gi} (9) Let r and r∗ be the vectors containing all transfer rates, of all groups and SUs, respectively. r = (r1, ., ri, ., re)T , r∗ = (r∗ 11, ., r∗ 1g1 ; .; r∗ i1, ., r∗ igi ; .; r∗ e1, ., r∗ ege )T (10) JEI(q) = n i=1 qi 2 × n n i=1 q2 i −1 , JEI(QG) = e i=1 QGi 2 × e e i=1 QG2 i −1 (11) JEI(r) = e i=1 ri 2 × e e i=1 r2 i −1 , JEI(r∗ ) = e i=1 gi k=1 r∗ ik 2 × n e i=1 gi k=1 r∗ ik 2 −1 . (12) 4. EXPERIMENTATIONS We consider four scenarios, containing two, three, four and five groups of SUs, respectively. After, we apply the mono and multi-scheduler algorithms. As a result, we deduct the JEI of the users’ rates, which are exposed in Figures 3 and 4. In all the Figures, we can easily notice that the equities obtained by using our model are very important compared to those of the model [16]. On average, this difference reaches 0.64, which is explained by the parallel transmission of several packets via several channels in our model. As a result, the users’ transfer rates are very close and the equities are very important. By cons, the model of [16] used a single transmission channel, therefore, the standard deviation of the users’ transfer rates is very important; then, the equities are very low. Figure 3. Groups’ equities, obtained by using the two models Equity-based free channels assignment for secondary... (Said Lakhal)
  • 6. 2062 Ì ISSN: 2088-8708 Figure 4. SUs’ equities, obtained by using the two models 5. CONCLUSION In this work, we have improved the equity of a previous work, by using a new model. The performance improvement can be explained by the increase of the number of used channels processed by the multi scheduler algorithm. Without forgetting the importance of the monoscheduler, which resides in the establishment of the scheduling chain. REFERENCES [1] Mitola J., ”Cognitive radio: an integrated agent architecture for software defined radio,” Ph. D. dissertation, Royal Institute of Technology (KTH), Sweden, pp. 8-13, 2000. [2] I.Akyildiz et, al., ”NeXt generation/ dynamic spectrum access/ cognitive radio wireless networks A survey,” Computer Networks, vol. 50, pp. 2127-2159, 2006. [3] A.Khan et, al., ”Research Challenges of Cognitive Radio,” IJERT, vol. 1, 2012. [4] P.Bhattacharya et, al., ”Smart Radio Spectrum Management for Cognitive Radio,” arXiv:1109.0257 [cs], 2011. [5] A.Idrissi and S.Lakhal, ”Equity between secondary users in a cognitive radio network,” Wseas, vol. 13, pp. 90-98, 2014. [6] Y.Z.S.Maharjan et, al., ”Distributed spectrum sensing in cognitive radio networks with fairness considera- tion: Efficiency of correlated equilibrium,” Mobile Adhoc and Sensor Systems, pp. 540-549, 2011. [7] A.Idrissi and S.Lakhal, ”An algorithm for fairness between secondary users in cognitive radio network,” JATIT, vol. 8, 2013. [8] A.Garhwal and P.Bhattacharya, ”A suervey on dynamic spectrum acces techniques for cognitive ra- dio,”arXiv preprint arXiv, pp. 1201-1964, 2012. [9] B.Benmammar et, al. ”A survey on dynamic spectrum acces techniques in cognitive radio net- works,”IJCNIS, vol. 5, pp. 68-79, 2013. [10] HT.Cheng and W.Zhuang, ”Simple channel sensing order in cognitive radio networks,”IEEE JSAC, vol. 29, pp. 676-688, 2011. [11] R.Urgaonkar and M.Neely, ”Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks,” IEEE transactions on mobile computing”, vol. 8, pp. 766-777, 2009. [12] S.Li et, al., ”Maximizing System Throughput by Cooperative Sensing in Cognitive Radio Networks,” IEEE/ACM Transactions on Networking, vol. 22, pp. 1245-1256, 2014. [13] L.Akter and B.Natarajan, ”Modeling Fairness in Resource Allocation for Secondary Users in a Competi- tive Cognitive Radio Network,” Wireless Telecommunications Symposium IEEE, pp. 1-6, 2010. [14] D.Damodaram and T.Venkateswarlu, ”Efficient Hardware Architecture for Cyclostationary Detec- tor,”Bulletin of Electrical Engineering and Informatics, vol.5, no.3, pp. 340-346, 2016. [15] E.A.S.Kang and R.Vig, ”Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco system through Signal and Interference Level based K Coverage Probability,”Indonesian Journal of Electrical Engineering and Informatics (IJEEI), vol. 5, no.1, pp. 69-76, 2017. [16] S.Lakhal and A.Idrissi., ”Queues management of secondary users in a cognitive radio network,” in NGNS14, pp. 302-307,2014. [17] C.Berk et, al., ”QoS-Aware User Cohabitation Coordinator in Cognitive Radio Networks,” IEEE Globe- com, pp. 1356-1361, 2012. [18] Y.Ma et, al., ”A Subcarrier-Pair Based Resource Allocation Scheme Using Proportional Fairness for Co- IJECE, Vol. 9, No. 3, June 2019 : 2057 – 2063
  • 7. IJECE ISSN: 2088-8708 Ì 2063 operative OFDM-Based Cognitive Radio Networks,” Sensors, vol. 13, pp. 10306-10332, 2013. [19] Q.Liang et, al., ”A distributed centralized scheme for Short and Long Term Spectrum Sharing with a Random Leader in Cognitive Radio Networks,”IEEE JSAC, vol. 30, pp. 2274-2284, 2012; [20] F.Yao et, al., ”Distributed Clustering in Cognitive Radio Ad Hoc Networks Using Soft-Constraint Affinity Propagation,” Radioengineering, 2012. [21] S.Maharjan et, al., ”Distributed Spectrum Sensing in Cognitive Radio Networks with Fairness Consid- eration, Efficiency of Correlated Equilibrium,” In IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, pp. 540-549, 2011: [22] A.S.Khobragade and R.D.Raut, ”Hybrid Spectrum Sensing Method for Cognitive Radio,” International Journal of Electrical and Computer Engineering (IJECE), vol.7, no. 5, pp. 2683-269551, 2017. [23] Jain R et, al., ”A Quantitive Measure of Fairness and Discrimination for Resource Allocation in Shared Computer Systems,” Eastern Research Laboratory, Digital Equipment Corporation Hudson, vol. 38, 1984. BIOGRAPHIES OF AUTHORS S. Lakhal obtained the diploma of application engineer in computer sciences in 1998, from the University Sidi Mohamed Ben Abdelah, Fes, Morocco, M.Sc. degree in modelization in 2006, from Mohammadia School of Engineering. He is currently a researcher at the Labora- tory of Electronics and Telecommunications, Mohammadia School of Engineers (EMI), Rabat, Morocco. His current research interests are Computing, Radio cognitive, Algorithmic and com- plexity, Modelization. Z. Guennoun received his engineering degree in Electronics and Telecommunications from the Electronics and Electrical Montefiore Institute, ULG Liege, Belgium in 1987; his M.Sc. degree in Communication Systems from the EMI School of Engineering, Rabat, Morocco in 1993; and his PhD degree from the same school in 1996. He visited the Centre for Communication Research (CCR) in Bristol University, UK, during the period of 1990-1994 to prepare a split PhD. Dur- ing 1988-1996 he worked as an Assistant Lecturer in the EMI School of engineering, and from 1996 he is working in the same school as a Professor Lecturer. His fields of interest are digital signal processing, error control coding, speech and image processing. Currently in charge of the laboratory of Electronics and Telecommunications (LEC) at EMI. IEEE member since 1990; and member of the Moroccan IEEE section executive committee. Equity-based free channels assignment for secondary... (Said Lakhal)