Abstract A cognitive radio network is considered as a key technology for future wireless communications. The motivation behind cognitive ra-dio is the effective usage of limited spectrum. Cognitive radio networks are designed to opportunistically exploit the underutilized or unused spectrum bands. Cognitive radio combines sensing, learning, and optimization algorithms to manage and adapt the radio sys-tem from the physical layer and up the communication stack. Spectrum Sensing, Spectrum Decision, Spectrum Mobility and Spectrum Sharing, are the four functionalities involved in Cognitive Radio Networks. This paper proposes a framework for data traffic man-agement by considering the QoS requirement of the secondary user and also the primary user activity. The Location information of the primary user in cognitive radio networks can be used to assist the communication among secondary users outside the transmission coverage area of primary users and also for tracking the primary user activities. The objective of the paper is to design a framework which will support the secondary user data transmission while considering the primary user activity and QoS requirement. Keywords- Cognitive Radio Networks, Primary User Activity, QoS management, Trusted Token Analyzer
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...IJASRD Journal
Today increasing demand for the radio spectrum access due to many new wireless networks such Bluetooth, share it and so on. The radio spectrum is the part of the Electromagnetic spectrum with frequencies from 3 KHz to 300 GHz and these are generally used in Telecommunication. Existing method tells that in a Cognitive Radio network, secondary users can access unused licensed spectrum bands. The Collaborative spectrum sensing has been used for the sensing reports from Secondary User’s are sent to one or more decision making authorities to produce more reliable decisions on the spectrum usage. However, in the presence of misbehaving or malicious secondary users, the integrity of the reports sent by SUs needs to be assessed to avoid interference with Primary User’s. Our proposed is an efficiently accessing the spectrum sharing among primary users and secondary users. In this project, they consider a cognitive radio with the primary and secondary links. By using Cognitive Radio, the unlicensed spectrum uses the licensed channel for data transmission. The proposed Channel Side Information at the cognitive radio network is generally used to maintain which primary user channels are ideal and arranged them in a priority based queue. The proposed system uses the Spectrum Sharing algorithm which calculates the load of the information which transfers. It provides a power minimization allocation approach, low power consumption. Result show that the both spectrum sensing and data transmission/receiving functions.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...IJASRD Journal
Today increasing demand for the radio spectrum access due to many new wireless networks such Bluetooth, share it and so on. The radio spectrum is the part of the Electromagnetic spectrum with frequencies from 3 KHz to 300 GHz and these are generally used in Telecommunication. Existing method tells that in a Cognitive Radio network, secondary users can access unused licensed spectrum bands. The Collaborative spectrum sensing has been used for the sensing reports from Secondary User’s are sent to one or more decision making authorities to produce more reliable decisions on the spectrum usage. However, in the presence of misbehaving or malicious secondary users, the integrity of the reports sent by SUs needs to be assessed to avoid interference with Primary User’s. Our proposed is an efficiently accessing the spectrum sharing among primary users and secondary users. In this project, they consider a cognitive radio with the primary and secondary links. By using Cognitive Radio, the unlicensed spectrum uses the licensed channel for data transmission. The proposed Channel Side Information at the cognitive radio network is generally used to maintain which primary user channels are ideal and arranged them in a priority based queue. The proposed system uses the Spectrum Sharing algorithm which calculates the load of the information which transfers. It provides a power minimization allocation approach, low power consumption. Result show that the both spectrum sensing and data transmission/receiving functions.
Dynamic Spectrum Allocation in Wireless sensor NetworksIJMER
Radio frequency spectrum is considered the most expensive and scarce resource among all wireless
network resources, and it is closely followed by the energy consumption, especially in low energy, battery powered
wireless sensor network devices. These days, there is a tremendous growth in the applications of wireless sensor
networks (WSNs) operating in unlicensed spectrum bands (ISM). Moreover, due to the rapid growth of wireless
devices that are designed to be operated in unlicensed spectrum bands, these spectrum bands have been overcrowded.
The problem with overcrowded spectrum or scarcity of spectrum can be solved by Dynamic Allocation of Spectrum.
In this paper we have presented the implementation and analysis of dynamic spectrum allocation in Wireless Sensors
Networks using the concept of Cognitive Radio Ad Hoc Network.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
A vertical handover decision approaches in next generation wireless networks ...ijmnct
In next generation wireless network the most desirable feature is its ability to move seamlessly over various
access network regardless of the network infrastructure is used. The handover between these dissimilar
networks can be explored by using vertical handover algorithms. This paper focuses on the vertical
handover decision methods and algorithms effectiveness. Most of the algorithms which are based on RSS
values provide vertical handover with small delay at a lower rate of throughput. There are such algorithms
which provide significant improvements in throughput but at a cost of higher delays. As per the need for the
real time applications in next generation wireless networks there is a requirement of developing new
optimized algorithms that are able to produce high throughput and minimizing signalling cost and delay.
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where variety of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network’s side to (a more intelligent) user’s side. On top of that network operators and regularities have come to the realization that assigned spectrum bands are not utilized as they should be. Cognitive radio stands out as a candidate technology to address many emerging issues in MNGN such as capacity, quality of service and spectral efficiency. As a transmission strategy, cognitive radio systems depend greatly on sensing the radio environment. In this paper, we present a novel approach for interference characterization in cognitive radio networks based on wideband chirp signal. The results presented show that improved sensing accuracy is maintained at tolerable system complexity.
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Surveyijceronline
The rapid growth in wireless communications has contributed to a huge demand on the deployment of new wireless services in both the licensed and unlicensed frequency spectrum. Cognitive Radio Networks (CRNs) is a recently emerging paradigm that aim to opportunistically access the intermittent periods of unoccupied frequency bands and therefore increasing the spectral efficiency. Unlike conventional radios, cognitive radios can intelligently adjust their transmission/reception parameters based on the interaction with the environment and find the best available spectrum bands to use. CRNs rely on cooperation for much of their functionality to make network more efficient. However, due to the distributed nature of cooperative spectrum sensing, the network is vulnerable to new types of security threats. The current spectrum sensing methods do not provide security mechanism to mitigate against these attacks. Traditional security solutions for noncognitive wireless networks do not work well when they are confronted with these new attacks. Furthermore, the security mechanisms proposed for cognitive radio ad hoc networks are not applicable for resource constrained cognitive radio sensor networks. These present considerable obstacles to development of a security mechanism that can defend against such attacks. This paper investigates threats and defense mechanism applicable for cognitive radio sensor networks to use the proposed guidelines for future development of a security mechanism for cognitive radio sensor networks.
Wireless Sensor Network (WSN) is partially distributed autonomous sensors to monitor physical or environmental conditions such as temperature, pressure etc. and to cooperatively pass their data through the network to the central location. The technique referred to as multi-hop wireless communications is used by the WSN’s to communicate. Due to the limited processing power and the finite power accessible to each sensor nodes, the application of regular routing techniques is not recommended. Hence recent advances in wireless sensor networks have made the routing protocols more efficient. This paper surveys and compares the advanced routing protocols. The three main categories discussed here are flat based, hierarchical based and location based. The paper concludes with open research issues.
Transferring quantum information through theijngnjournal
Transmission of information in the form of qubits much faster than the speed of light is the important
aspects of quantum information theory. Quantum information processing exploits the quantum nature of
information that needs to be stored, encoded, transmit, receive and decode the information in the form of
qubits. Bosonic channels appear to be very attractive for the physical implementation of quantum
communication. This paper does the study of quantum channels and how best it can be implemented with
the existing infrastructure that is the classical communication. Multiple access to the quantum network is
the requirement where multiple users want to transmit their quantum information simultaneously without
interfering with each others.
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations csandit
The rapidly growing number of wireless communication devices has led to massive increases in
radio traffic density, resulting in a noticeable shortage of available spectrum. To address this
shortage, the Cognitive Radio (CR) technology offers promising solutions that aim to improve
the spectrum utilization. The operation of CR relies on detecting the so-called spectrum holes,
the frequency bands that remain unoccupied by their licensed operators. The unlicensed users
are then allowed to communicate using these spectrum holes. As such, the performance of CR is
highly dependent on the employed spectrum sensing methods. Several sensing methods are
already available. However, no individual method can accommodate all potential CR operation
scenarios. Hence, it is fair to ascertain that the performance of a CR device can be improved if
it is capable of supporting several sensing methods. It should obviously also be able to select the
most suitable method. In this paper, several spectrum sensing methods are compared and
analyzed, aiming to identify their advantages and shortcomings in different CR operating
conditions. Furthermore, it identifies the features that need to be considered while selecting a
suitable sensing method from the catalog of available methods.
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIDES Editor
Seamless interoperability between two dissimilar
networks requires handoff from one network to the other.
Such handoffs are known as vertical handoffs. Vertical handoff
introduces a shift in the approach to handoffs. It deals with
handoffs between dissimilar networks, such as from an access
point to a base station or vice versa. The integration of diverse
but complementary cellular and wireless technologies in the
next generation of wireless communication systems requires
the design of intelligent vertical handoff decision algorithms
to enable mobile users to seamlessly switch network access
and experience uninterrupted service continuity anywhere
and anytime. This paper provides a vertical handoff decision
algorithm that enables wireless access network selection at a
mobile terminal. Example shows that our proposed vertical
handover algorithm is able to determine the best access
network.
Performance analysis of massive multiple input multiple output for high speed...IJECEIAES
This paper analytically reviews the performance of massive multiple input multiple output (MIMO) system for communication in highly mobility scenarios like high speed Railways. As popularity of high speed train increasing day by day, high data rate wireless communication system for high speed train is extremely required. 5G wireless communication systems must be designed to meet the requirement of high speed broadband services at speed of around 500 km/h, which is the expected speed achievable by HSR systems, at a data rate of 180 Mbps or higher. Significant challenges of high mobility communications are fast time-varying fading, channel estimation errors, doppler diversity, carrier frequency offset, inter carrier interference, high penetration loss and fast and frequent handovers. Therefore, crucial requirement to design high mobility communication channel models or systems prevails. Recently, massive MIMO techniques have been proposed to significantly improve the performance of wireless networks for upcoming 5G technology. Massive MIMO provide high throughput and high energy efficiency in wireless communication channel. In this paper, key findings, challenges and requirements to provide high speed wireless communication onboard the high speed train is pointed out after thorough literature review. In last, future research scope to bridge the research gap by designing efficient channel model by using massive MIMO and other optimization method is mentioned.
Simulation and analysis of cognitive radioijngnjournal
The increasing demand of wireless applications has put a lot of limitations on the use of available
radio spectrum is limited and precious resource. Many survey of spectrum utilization shows that entire
spectrum is not used at all the times, so many of the radio spectrum is underutilized. Some of the frequency
bands in the spectrum are unoccupied, some of the frequency bands less occupied and few bands are over
utilized. Cognitive radio system is a technique which overcomes that spectrum underutilization. Cognitive
radio is a technique where secondary user looks for a free band to use when primary user is not in use of
its licensed band. A function of cognitive radio is called Spectrum sensing which enables to search for the
free bands and it helps to detect the spectrum hole (frequency band which is free enough to be used) which
can be utilized by secondary user with high spectral resolution capability. The idea of simulation and
analysis of Cognitive Radio System to reuse unused spectrum to increase the total system capacity was
brought in this paper and this work digs into the practical implementation of a Cognitive radio system.
MATLAB R2007b (version7.5) has been used to test the performance of Cognitive radio dynamically.
Mobile Adhoc Network (MANET) is a self-configuring and infrastructure-less network which consists of mobile devices such as mobiles, laptops, PDA's etc. Because of its lack of infrastructure, wireless mobile communication, dynamic topology, MANET is vulnerable to various security attacks. This survey paper presents an overview of developments of voting and non-voting based certificate revocation mechanisms in past few years. Certificate revocation is an important method used to secure the MANET. Certificate revocation isolates the attacker nodes from participating in network activities by revoking its certificate. Over last few years different schemes are explored for certificate revocation. In concluding section we present the limitations of the current cluster based certificate revocation scheme.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Optimizing the Number of Samples for Multi-Channel Spectrum SensingFabrizio Granelli
Presentation of the paper "Optimizing the Number of Samples for Multi-Channel Spectrum Sensing" at the IEEE International Conference on Communications (IEEE ICC 2015)
Dynamic Spectrum Allocation in Wireless sensor NetworksIJMER
Radio frequency spectrum is considered the most expensive and scarce resource among all wireless
network resources, and it is closely followed by the energy consumption, especially in low energy, battery powered
wireless sensor network devices. These days, there is a tremendous growth in the applications of wireless sensor
networks (WSNs) operating in unlicensed spectrum bands (ISM). Moreover, due to the rapid growth of wireless
devices that are designed to be operated in unlicensed spectrum bands, these spectrum bands have been overcrowded.
The problem with overcrowded spectrum or scarcity of spectrum can be solved by Dynamic Allocation of Spectrum.
In this paper we have presented the implementation and analysis of dynamic spectrum allocation in Wireless Sensors
Networks using the concept of Cognitive Radio Ad Hoc Network.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
A vertical handover decision approaches in next generation wireless networks ...ijmnct
In next generation wireless network the most desirable feature is its ability to move seamlessly over various
access network regardless of the network infrastructure is used. The handover between these dissimilar
networks can be explored by using vertical handover algorithms. This paper focuses on the vertical
handover decision methods and algorithms effectiveness. Most of the algorithms which are based on RSS
values provide vertical handover with small delay at a lower rate of throughput. There are such algorithms
which provide significant improvements in throughput but at a cost of higher delays. As per the need for the
real time applications in next generation wireless networks there is a requirement of developing new
optimized algorithms that are able to produce high throughput and minimizing signalling cost and delay.
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where variety of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network’s side to (a more intelligent) user’s side. On top of that network operators and regularities have come to the realization that assigned spectrum bands are not utilized as they should be. Cognitive radio stands out as a candidate technology to address many emerging issues in MNGN such as capacity, quality of service and spectral efficiency. As a transmission strategy, cognitive radio systems depend greatly on sensing the radio environment. In this paper, we present a novel approach for interference characterization in cognitive radio networks based on wideband chirp signal. The results presented show that improved sensing accuracy is maintained at tolerable system complexity.
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Surveyijceronline
The rapid growth in wireless communications has contributed to a huge demand on the deployment of new wireless services in both the licensed and unlicensed frequency spectrum. Cognitive Radio Networks (CRNs) is a recently emerging paradigm that aim to opportunistically access the intermittent periods of unoccupied frequency bands and therefore increasing the spectral efficiency. Unlike conventional radios, cognitive radios can intelligently adjust their transmission/reception parameters based on the interaction with the environment and find the best available spectrum bands to use. CRNs rely on cooperation for much of their functionality to make network more efficient. However, due to the distributed nature of cooperative spectrum sensing, the network is vulnerable to new types of security threats. The current spectrum sensing methods do not provide security mechanism to mitigate against these attacks. Traditional security solutions for noncognitive wireless networks do not work well when they are confronted with these new attacks. Furthermore, the security mechanisms proposed for cognitive radio ad hoc networks are not applicable for resource constrained cognitive radio sensor networks. These present considerable obstacles to development of a security mechanism that can defend against such attacks. This paper investigates threats and defense mechanism applicable for cognitive radio sensor networks to use the proposed guidelines for future development of a security mechanism for cognitive radio sensor networks.
Wireless Sensor Network (WSN) is partially distributed autonomous sensors to monitor physical or environmental conditions such as temperature, pressure etc. and to cooperatively pass their data through the network to the central location. The technique referred to as multi-hop wireless communications is used by the WSN’s to communicate. Due to the limited processing power and the finite power accessible to each sensor nodes, the application of regular routing techniques is not recommended. Hence recent advances in wireless sensor networks have made the routing protocols more efficient. This paper surveys and compares the advanced routing protocols. The three main categories discussed here are flat based, hierarchical based and location based. The paper concludes with open research issues.
Transferring quantum information through theijngnjournal
Transmission of information in the form of qubits much faster than the speed of light is the important
aspects of quantum information theory. Quantum information processing exploits the quantum nature of
information that needs to be stored, encoded, transmit, receive and decode the information in the form of
qubits. Bosonic channels appear to be very attractive for the physical implementation of quantum
communication. This paper does the study of quantum channels and how best it can be implemented with
the existing infrastructure that is the classical communication. Multiple access to the quantum network is
the requirement where multiple users want to transmit their quantum information simultaneously without
interfering with each others.
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations csandit
The rapidly growing number of wireless communication devices has led to massive increases in
radio traffic density, resulting in a noticeable shortage of available spectrum. To address this
shortage, the Cognitive Radio (CR) technology offers promising solutions that aim to improve
the spectrum utilization. The operation of CR relies on detecting the so-called spectrum holes,
the frequency bands that remain unoccupied by their licensed operators. The unlicensed users
are then allowed to communicate using these spectrum holes. As such, the performance of CR is
highly dependent on the employed spectrum sensing methods. Several sensing methods are
already available. However, no individual method can accommodate all potential CR operation
scenarios. Hence, it is fair to ascertain that the performance of a CR device can be improved if
it is capable of supporting several sensing methods. It should obviously also be able to select the
most suitable method. In this paper, several spectrum sensing methods are compared and
analyzed, aiming to identify their advantages and shortcomings in different CR operating
conditions. Furthermore, it identifies the features that need to be considered while selecting a
suitable sensing method from the catalog of available methods.
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIDES Editor
Seamless interoperability between two dissimilar
networks requires handoff from one network to the other.
Such handoffs are known as vertical handoffs. Vertical handoff
introduces a shift in the approach to handoffs. It deals with
handoffs between dissimilar networks, such as from an access
point to a base station or vice versa. The integration of diverse
but complementary cellular and wireless technologies in the
next generation of wireless communication systems requires
the design of intelligent vertical handoff decision algorithms
to enable mobile users to seamlessly switch network access
and experience uninterrupted service continuity anywhere
and anytime. This paper provides a vertical handoff decision
algorithm that enables wireless access network selection at a
mobile terminal. Example shows that our proposed vertical
handover algorithm is able to determine the best access
network.
Performance analysis of massive multiple input multiple output for high speed...IJECEIAES
This paper analytically reviews the performance of massive multiple input multiple output (MIMO) system for communication in highly mobility scenarios like high speed Railways. As popularity of high speed train increasing day by day, high data rate wireless communication system for high speed train is extremely required. 5G wireless communication systems must be designed to meet the requirement of high speed broadband services at speed of around 500 km/h, which is the expected speed achievable by HSR systems, at a data rate of 180 Mbps or higher. Significant challenges of high mobility communications are fast time-varying fading, channel estimation errors, doppler diversity, carrier frequency offset, inter carrier interference, high penetration loss and fast and frequent handovers. Therefore, crucial requirement to design high mobility communication channel models or systems prevails. Recently, massive MIMO techniques have been proposed to significantly improve the performance of wireless networks for upcoming 5G technology. Massive MIMO provide high throughput and high energy efficiency in wireless communication channel. In this paper, key findings, challenges and requirements to provide high speed wireless communication onboard the high speed train is pointed out after thorough literature review. In last, future research scope to bridge the research gap by designing efficient channel model by using massive MIMO and other optimization method is mentioned.
Simulation and analysis of cognitive radioijngnjournal
The increasing demand of wireless applications has put a lot of limitations on the use of available
radio spectrum is limited and precious resource. Many survey of spectrum utilization shows that entire
spectrum is not used at all the times, so many of the radio spectrum is underutilized. Some of the frequency
bands in the spectrum are unoccupied, some of the frequency bands less occupied and few bands are over
utilized. Cognitive radio system is a technique which overcomes that spectrum underutilization. Cognitive
radio is a technique where secondary user looks for a free band to use when primary user is not in use of
its licensed band. A function of cognitive radio is called Spectrum sensing which enables to search for the
free bands and it helps to detect the spectrum hole (frequency band which is free enough to be used) which
can be utilized by secondary user with high spectral resolution capability. The idea of simulation and
analysis of Cognitive Radio System to reuse unused spectrum to increase the total system capacity was
brought in this paper and this work digs into the practical implementation of a Cognitive radio system.
MATLAB R2007b (version7.5) has been used to test the performance of Cognitive radio dynamically.
Mobile Adhoc Network (MANET) is a self-configuring and infrastructure-less network which consists of mobile devices such as mobiles, laptops, PDA's etc. Because of its lack of infrastructure, wireless mobile communication, dynamic topology, MANET is vulnerable to various security attacks. This survey paper presents an overview of developments of voting and non-voting based certificate revocation mechanisms in past few years. Certificate revocation is an important method used to secure the MANET. Certificate revocation isolates the attacker nodes from participating in network activities by revoking its certificate. Over last few years different schemes are explored for certificate revocation. In concluding section we present the limitations of the current cluster based certificate revocation scheme.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Optimizing the Number of Samples for Multi-Channel Spectrum SensingFabrizio Granelli
Presentation of the paper "Optimizing the Number of Samples for Multi-Channel Spectrum Sensing" at the IEEE International Conference on Communications (IEEE ICC 2015)
Multi Channel Protocols In Cognitive Radio NetworksMuhammad Mustafa
Cognitive radio is a paradigm for wireless communication in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. This alteration of parameters is based on the active monitoring of several factors in the external and internal radio environment, such as radio frequency spectrum, user behaviour and network state. this presentation discusses main approaches and protocols of multichannel cognitive radio networks.
Optical power debugging in dwdm system having fixed gain amplifierseSAT Journals
Abstract
This article covers optical power measurement of light signal in DWDM network and debugging of optical power as per the specifications of DWDM system with fix gain amplifier. The measurement and calculations of each component of DWDM system is discussed individually. Optical power of individual optical channel, aggregate optical power of multiplexed signals, relation with amplifier gain, insertion loss and attenuation on signal are the key factors involved in design and operation of DWDM system. From transmitter to receiver, the working performance of the DWDM system depends on the optical strength of input light signal should be as per specifications of its components. A description of input and output optical power of light signal of each DWDM component and its relationship is discussed. If there is any deviation as per specifications is observed, process to calculate deviation and debug is given with working example in this article.
Keywords: Dense wavelength division multiplexing (DWDM), Optical MUX/DEMUX, Optical transmitters/receivers, Optical amplifiers, Optical Fiber, Optical power, Attenuation, Optical Power Debugging
Bandwidth is Becoming Commodity :
Price per bit went down by 99% in the last 5 years on the optical side
This is one of the problems of the current telecom market
Optical Metro – cheap high bandwidth access
$1000 a month for 100FX (in major cities)
This is less than the cost of T1 several years ago
Optical Long-Haul and Metro access - change of the price point
Reasonable price drive more users (non residential)
CR technology is based on the fact that the licensed systems (also named primary systems PS) are not always using their spectrum bands; CR brings new radio types—cognitive radios—that should firstly, identify the existing spectrum holes, and secondly, utilize them according to an access.
An overview of cognitive radio, comparison of cognitive radio vs. conventional radio, real-world applications for cognitive radio networks, how cognitive radios improve spectrum efficiency and address the wireless spectrum shortage.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
A cognitive radio and dynamic spectrum access – a studyijngnjournal
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the
demand of future services. While all of the radio spectrum is allocated to different services, applications
and users, observation show that usage of the spectrum is actually quite low. To overcome this problem
and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication,
in which a transmitter and receiver can detect intelligently communication channels that are in use and
those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes
possible the use of available radio frequency spectrum while minimizing interference with other users. CRs
must have the capability to learn and adapt their wireless transmission according to the surrounding radio
environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising
since they have a great importance for the implementation of Cognitive Radio networks architecture.
Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless
communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to
the actual licensees. This paper is a review and comparison of different DSA models and methods.
A Cognitive Radio And Dynamic Spectrum Access – A Studyjosephjonse
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the demand of future services. While all of the radio spectrum is allocated to different services, applications and users, observation show that usage of the spectrum is actually quite low. To overcome this problem and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication, in which a transmitter and receiver can detect intelligently communication channels that are in use and those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes possible the use of available radio frequency spectrum while minimizing interference with other users. CRs must have the capability to learn and adapt their wireless transmission according to the surrounding radio environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising since they have a great importance for the implementation of Cognitive Radio networks architecture. Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to the actual licensees. This paper is a review and comparison of different DSA models and methods.
With cloud computing, users can remotely store their data into the cloud and use on-demand high-quality applications. Data outsourcing: users are relieved from the burden of data storage and maintenance When users put their data (of large size) on the cloud, the data integrity protection is challenging enabling public audit for cloud data storage security is important Users can ask an external audit party to check the integrity of their outsourced data. Purpose of developing data security for data possession at un-trusted cloud storage servers we are often limited by the resources at the cloud server as well as at the client. Given that the data sizes are large and are stored at remote servers, accessing the entire file can be expensive in input output costs to the storage server. Also transmitting the file across the network to the client can consume heavy bandwidths. Since growth in storage capacity has far outpaced the growth in data access as well as network bandwidth, accessing and transmitting the entire archive even occasionally greatly limits the scalability of the network resources. Furthermore, the input output to establish the data proof interferes with the on-demand bandwidth of the server used for normal storage and retrieving purpose. The Third Party Auditor is a respective person to manage the remote data in a global manner.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Routing in Cognitive Radio Networks - A SurveyIJERA Editor
Cognitive Radio Networks (CRNs) have been emerged as a revolutionary solution to migrate the spectrum
scarcity problem in wireless networks. Due to increasing demand for additional spectrum resources, CRNs have
been receiving significant research to solve issues related with spectrum underutilization. This technology
brings efficient spectrum usage and effective interference avoidance, and also brings new challenges to routing
in multi-hop Cognitive Radio Networks. In CRN, unlicensed users or secondary users are able to use
underutilized licensed channels, but they have to leave the channel if any interference is caused to the primary or
licensed users. So CR technology allows sharing of licensed spectrum band in opportunistic and non-interfering
manner. Different routing protocols have been proposed recently based on different design goals under different
assumptions.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...IJCNCJournal
Cognitive Radio Network (CRN) provides effective capabilities for resource allocation with the valuable spectrum resources in the network. It provides the effective allocation of resources to the unlicensed users or Secondary Users (SUs) to access the spectrum those are unused by the licensed users or Primary Users (Pus). This paper develops an Optimal Relay Selection scheme with the spectrum-sharing scheme in CRN. The proposed Cross-Layer Spider Swarm Shiftingis implemented in CRN for the optimal relay selection with Spider Swarm Optimization (SSO). The shortest path is estimated with the data shifting model for the data transmission path in the CRN. This study examines a cognitive relay network (CRN) with interference restrictions imposed by a mobile end user (MU). Half-duplex communication is used in the proposed system model between a single primary user (PU) and a single secondary user (SU). Between the SU source and SU destination, an amplify and forward (AF) relaying mechanism is also used. While other nodes (SU Source, SU relays, and PU) are supposed to be immobile in this scenario, the mobile end user (SU destination) is assumed to travel at high vehicle speeds. The suggested method achieves variety by placing a selection combiner at the SU destination and dynamically selecting the optimal relay for transmission based on the greatest signal-to-noise (SNR) ratio. The performance of the proposed Cross-Layer Spider Swarm Shifting model is compared with the Spectrum Sharing Optimization with QoS Guarantee (SSO-QG). The comparative analysis expressed that the proposed Cross-Layer Spider Swarm Shifting model delay is reduced by 15% compared with SSO-QG. Additionally, the proposed Cross-Layer Spider Swarm Shiftingexhibits the improved network performance of ~25% higher throughput compared with SSO-QG.
Random Relay Selection based Heuristic Optimization Model for the Scheduling ...IJCNCJournal
Cognitive Radio Network (CRN) provides effective capabilities for resource allocation with the valuable spectrum resources in the network. It provides the effective allocation of resources to the unlicensed users or Secondary Users (SUs) to access the spectrum those are unused by the licensed users or Primary Users (Pus). This paper develops an Optimal Relay Selection scheme with the spectrum-sharing scheme in CRN. The proposed Cross-Layer Spider Swarm Shiftingis implemented in CRN for the optimal relay selection with Spider Swarm Optimization (SSO). The shortest path is estimated with the data shifting model for the data transmission path in the CRN. This study examines a cognitive relay network (CRN) with interference restrictions imposed by a mobile end user (MU). Half-duplex communication is used in the proposed system model between a single primary user (PU) and a single secondary user (SU). Between the SU source and SU destination, an amplify and forward (AF) relaying mechanism is also used. While other nodes (SU Source, SU relays, and PU) are supposed to be immobile in this scenario, the mobile end user (SU destination) is assumed to travel at high vehicle speeds. The suggested method achieves variety by placing a selection combiner at the SU destination and dynamically selecting the optimal relay for transmission based on the greatest signal-to-noise (SNR) ratio. The performance of the proposed Cross-Layer Spider Swarm Shifting model is compared with the Spectrum Sharing Optimization with QoS Guarantee (SSO-QG). The comparative analysis expressed that the proposed Cross-Layer Spider Swarm Shifting model delay is reduced by 15% compared with SSO-QG. Additionally, the proposed Cross-Layer Spider Swarm Shiftingexhibits the improved network performance of ~25% higher throughput compared with SSO-QG.
Security threats and detection technique in cognitive radio network with sens...eSAT Journals
Abstract Communication world is growing day by day In wireless communication system introduces a new technology which I known as cognitive radio network its name as CRN. In CRN Un-authorized user can used empty channel from the spectrum band of authorized user this help to improve the spectrum efficiency as well generate a problem like some malicious or fake users can used the channel and hamper the communication. So in this paper we discuss on security threats and technique to find them with sensing strategies. Keywords: Cognitive radio network, Pus, SUs, Spectrum sensing, spectrum holes
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...rahulmonikasharma
In nowadays the number of wireless users and applications increases, it has become more and more difficult for the proper spectrum utilization by allocate frequencies. However measurements have shown that there is no spectrum scarcity; rather, there is inefficient utilization only. Cognitive Radio (CR) to facilitate efficient utilization of the radio spectrum in a fair-minded way and to provide highly reliable communication for all users of the networks. In this paper, a simulation framework based on NetSim simulator is proposed. This framework can be used to investigate and evaluate the impact of lower layers, i.e., data link layer and physical layer. Due to the importance of packet drop probability, delay and throughput as QoS requirements in real-time reliable applications, these metrics are evaluated over Cognitive Radio Networks (CRNs) through NetSim simulator. Our simulations demonstrate that the design of new networks over CRNs should be considered based on CR-related parameters such as activity model of Primary Users(PU), Secondary Users(SU),sensing time ,spectral efficiency, throughput, delay and Interference. An Analysis of the result shows that, the CBR traffic is the best in terms of throughput and spectral efficiency when the different conditions of PUs and SUs.
Security threats and detection technique in cognitive radio network with sens...eSAT Journals
Abstract Communication world is growing day by day In wireless communication system introduces a new technology which I known as cognitive radio network its name as CRN. In CRN Un-authorized user can used empty channel from the spectrum band of authorized user this help to improve the spectrum efficiency as well generate a problem like some malicious or fake users can used the channel and hamper the communication. So in this paper we discuss on security threats and technique to find them with sensing strategies Keywords: Cognitive radio network, Pus, SUs, Spectrum sensing, spectrum holes
Credit risk value based detection of multiple selfish node attacks in cogniti...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Similar to A framework for data traffic in cognitive radio net works using trusted token analyzer scheme (20)
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
Abstract
Soil stabilization has proven to be one of the oldest techniques to improve the soil properties. Literature review conducted revealed
that uses of natural inorganic stabilizers are found to be one of the best options for soil stabilization. In this regard an attempt has
been made to evaluate the influence of RBI-81 stabilizer on properties of black cotton soil through laboratory investigations. Black
cotton soil with varying percentages of RBI-81 viz., 0, 0.5, 1, 1.5, 2, and 2.5 percent were studied for moisture density relationships
and strength behaviour of soils. Also the effect of curing period was evaluated as literature review clearly emphasized the strength
gain of soils stabilized with RBI-81 over a period of time. The results obtained shows that the unconfined compressive strength of
specimens treated with RBI-81 increased approximately by 250% for a curing period of 28 days as compared to virgin soil. Further
the CBR value improved approximately by 400%. The studies indicated an increasing trend for soil strength behaviour with
increasing percentage of RBI-81 suggesting its potential applications in soil stabilization.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
Abstract
Increase in traffic along with heavier magnitude of wheel loads cause rapid deterioration in pavements. There is a need to improve
density, strength of soil subgrade and other pavement layers. In this study an attempt is made to improve the properties of locally
available loamy soil using twin approaches viz., i) increasing the compaction of soil and ii) treating the soil with chemical stabilizer.
Laboratory studies are carried out on both untreated and treated soil samples compacted by different compaction efforts. Studies
show that increase in compaction effort results in increase in density of soil. However in soil treated with chemical stabilizer, rate of
increase in density is not significant. The soil treated with chemical stabilizer exhibits improvement in both strength and performance
properties.
Keywords: compaction, density, subgradestabilization, resilient modulus
Geographical information system (gis) for water resources managementeSAT Journals
Abstract
Water resources projects are inherited with overlapping and at times conflicting objectives. These projects are often of varied sizes
ranging from major projects with command areas of millions of hectares to very small projects implemented at the local level. Thus,
in all these projects there is seldom proper coordination which is essential for ensuring collective sustainability.
Integrated watershed development and management is the accepted answer but in turn requires a comprehensive framework that can
enable planning process involving all the stakeholders at different levels and scales is compulsory. Such a unified hydrological
framework is essential to evaluate the cause and effect of all the proposed actions within the drainage basins.
The present paper describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) which is
intended to meet the specific information needs of the various line departments of a typical State connected with water related aspects.
The HIS consist of a hydrologic information database coupled with tools for collating primary and secondary data and tools for
analyzing and visualizing the data and information. The HIS also incorporates hydrological model base for indirect assessment of
various entities of water balance in space and time. The framework would be maintained and updated to reflect fully the most
accurate ground truth data and the infrastructure requirements for planning and management.
Keywords: Hydrological Information System (HIS); WebGIS; Data Model; Web Mapping Services
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
Abstract
This paper presents an outlook on experimental behavior and a comparison with predicted formula on the behaviour of circular
concentrically loaded self-consolidating fibre reinforced concrete filled steel tube columns (HSSCFRC). Forty-five specimens were
tested. The main parameters varied in the tests are: (1) percentage of fiber (2) tube diameter or width to wall thickness ratio (D/t
from 15 to 25) (3) L/d ratio from 2.97 to 7.04 the results from these predictions were compared with the experimental data. The
experimental results) were also validated in this study.
Keywords: Self-compacting concrete; Concrete-filled steel tube; axial load behavior; Ultimate capacity.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
Abstract
Efficiency of the road network system is analyzed by travel time reliability measures. The study overlooks on an important measure of
travel time reliability and prioritizing Tiruchirappalli road network. Traffic volume and travel time were collected using license plate
matching method. Travel time measures were estimated from average travel time and 95th travel time. Effect of non-motorized vehicle
on efficiency of road system was evaluated. Relation between buffer time index and traffic volume was created. Travel time model has
been developed and travel time measure was validated. Then service quality of road sections in network were graded based on
travel time reliability measures.
Keywords: Buffer Time Index (BTI); Average Travel Time (ATT); Travel Time Reliability (TTR); Buffer Time (BT).
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
Abstract
Land and water are the two vital natural resources, the optimal management of these resources with minimum adverse environmental
impact are essential not only for sustainable development but also for human survival. Satellite remote sensing with geographic
information system has a pragmatic approach to map and generate spatial input layers of predicting response behavior and yield of
watershed. Hence, in the present study an attempt has been made to understand the hydrological process of the catchment at the
watershed level by drawing the inferences from moprhometric analysis and runoff. The study area chosen for the present study is
Yagachi catchment situated in Chickamaglur and Hassan district lies geographically at a longitude 75⁰52’08.77”E and
13⁰10’50.77”N latitude. It covers an area of 559.493 Sq.km. Morphometric analysis is carried out to estimate morphometric
parameters at Micro-watershed to understand the hydrological response of the catchment at the Micro-watershed level. Daily runoff
is estimated using USDA SCS curve number model for a period of 10 years from 2001 to 2010. The rainfall runoff relationship of the
study shows there is a positive correlation.
Keywords: morphometric analysis, runoff, remote sensing and GIS, SCS - method
-
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
The Internet of Things (IoT) is a revolutionary concept that connects everyday objects and devices to the internet, enabling them to communicate, collect, and exchange data. Imagine a world where your refrigerator notifies you when you’re running low on groceries, or streetlights adjust their brightness based on traffic patterns – that’s the power of IoT. In essence, IoT transforms ordinary objects into smart, interconnected devices, creating a network of endless possibilities.
Here is a blog on the role of electrical and electronics engineers in IOT. Let's dig in!!!!
For more such content visit: https://nttftrg.com/
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Planning Of Procurement o different goods and services
A framework for data traffic in cognitive radio net works using trusted token analyzer scheme
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 611
A FRAMEWORK FOR DATA TRAFFIC IN COGNITIVE RADIO NET-
WORKS USING TRUSTED TOKEN ANALYZER SCHEME
Nikitha Lee Joy1
, Sangeetha Senthilkumar2
, S.Sathyaraj3
1
PG Student, Oxford Engineering College, Trichy
2
Assistant Professor, Oxford Engineering College, Trichy
3
Assistant Professor, Oxford Engineering College, Trichy
Abstract
A cognitive radio network is considered as a key technology for future wireless communications. The motivation behind cognitive ra-
dio is the effective usage of limited spectrum. Cognitive radio networks are designed to opportunistically exploit the underutilized or
unused spectrum bands. Cognitive radio combines sensing, learning, and optimization algorithms to manage and adapt the radio sys-
tem from the physical layer and up the communication stack. Spectrum Sensing, Spectrum Decision, Spectrum Mobility and Spectrum
Sharing, are the four functionalities involved in Cognitive Radio Networks. This paper proposes a framework for data traffic man-
agement by considering the QoS requirement of the secondary user and also the primary user activity. The Location information of
the primary user in cognitive radio networks can be used to assist the communication among secondary users outside the transmission
coverage area of primary users and also for tracking the primary user activities. The objective of the paper is to design a framework
which will support the secondary user data transmission while considering the primary user activity and QoS requirement.
Keywords- Cognitive Radio Networks, Primary User Activity, QoS management, Trusted Token Analyzer
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Cognitive radio is a recent novel approach for the realization
of intelligent and sophisticated wireless systems. Software
Defined Radio, a recent development in wireless technology,
promise to address some of the major limitations like ineffi-
cient utilization and management of the radio frequency (RF)
in both licensed and unlicensed spectrum band experienced
by legacy wireless communication system. A radio that is able
to reliably sense the spectral environment over a wide band-
width, detect the presence/absence of legacy users and use the
spectrum only if communication does not interfere with any
primary user is called a cognitive radio. The seminal paper of
J. Mitola [8] introduced the concept of cognitive radio. Ian F.
Akyildiz et al. [1] defines cognitive radio as: “A Cognitive
Radio is a radio that can change its transmitter parameters
based on interaction with the environment in which it oper-
ates”.
Cognitive radio networks are composed of cognitive radio
devices. An interconnected set of cognitive radio devices that
share information is defined as a cognitive radio networks.
(CRN).Cognitive radio networks (CRN) are envisioned to
provide high bandwidth to mobile users via heterogeneous
wireless architectures and dynamic spectrum access (DSA)
techniques. Cognitive Radio Networks aim at performing the
cognitive operations such as sensing the spectrum, managing
available resources, and making user-independent, intelligent
decisions based on cooperation of multiple cognitive nodes.
CR networks however impose unique challenges because of
the high fluctuation in the available spectrum as well as the
diverse quality-of-service (QoS) requirements of various ap-
plications and secondary users. To address these challenges,
first, CR networks are required to determine which portions of
the spectrum are available, called spectrum sensing [2], [10].
Furthermore, how to coordinate multiple CR users to share the
spectrum band, called spectrum sharing, is another important
issue in CR networks [6], [16].Secondary users have to vacate
the channel for the primary user, when they arrive, called
spectrum mobility is another aspect of CRN.Fig.1shows the
dynamic spectrum management framework [2]. Spectrum de-
cision in CRN refers to the ability of the secondary users to
select the best available spectrum band to satisfy the user‟s
quality of service requirements. Quality of Service for the sec-
ondary users involves data traffic management.
Fig 1: Dynamic Spectrum Management Framework
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 612
To improve spectrum efficiency in cognitive radio networks,
many operations such as sharing data in cooperative spectrum
sensing, broadcasting spectrum-aware routing information,
and coordinating spectrum access rely on control message are
exchanged on a common control channel. Thus, a reliable and
„„always on‟‟ control channel is unavoidable in CRN.
2. RELATED WORKS
2.1 Spectrum Decision
For spectrum allocation, a global optimization scheme is de-
veloped based on graph theory [17]. Distributed spectrum al-
location based on local bargaining is proposed in [4], where
CR users negotiate spectrum assignment within local self-
organized groups. In [20], a dynamic channel selection
scheme is developed for delay-sensitive applications based on
a priority queuing analysis and a decentralized learning algo-
rithm.
2.2 QoS Management /Data Traffic Management
QoS support in CR systems is critical to ensure its success in
consumer wireless market .In contrast to traditional wireless
communication networks, one of the major challenges faced in
cognitive radio networks is the interruptions from primary
users. The service of packets in cognitive radio network has to
be interrupted when primary users emerges. Usually, the
emergence of primary user is assumed to be stationary., Such
an assumption may not be true in practical means, since the
traffic pattern of primary users could be time variant. [9] Spe-
cifies transient analysis of data traffic in cognitive radio net-
works.
A time-varying service capacity is discussed in [12] to widen
the application. The problem of designing effective routing
solutions for multi-hop CRNs, which is a focal issue to fully
unleash the potentials of the cognitive networking paradigm, is
focused in [25].
3. PROPOSED SYSTEM
3.1 System Model
Primary radio nodes are the legacy users and they can access
their respective licensed bands without any restriction. Indeed,
PR nodes have the highest priority to access the channels and
should not be interrupted by the CR nodes.
We consider an OSS environment, where secondary users
equipped with CRs are operating over N orthogonal frequency
channels that are licensed to legacy(primary) users. One of the
nodes is considered as head node or server. It involves the
trusted token analyzer scheme and location verification
schemes.
Fig 2: General Framework
In cognitive radio network each spectrum band is characte-
rized based on local observations and on statistical informa-
tion of the primary networks which is normally called PU ac-
tivities. The selection of the most appropriate spectrum band is
the next step in spectrum decision, based on the spectrum band
characterization. Thirdly, a CR should be able to reconfigure
its transceiver parameters to support communication within
the selected spectrum band.
Once the spectrum decision is made, and a particular spectrum
is chosen for secondary data transmission, the rendezvous
process is initiated. Link establishment in distributed cognitive
radio networks requires the communicating nodes to be
rendezvous to exchange control
Figure 2 specifies the general frame work for CR transmis-
sion. Geo-location database contains the information like the
channel condition, capacity of the channel etc. The primary
user activity is monitored in spectrum sensing along with the
sensing of unused or under-utilized spectrum. Based on these
information the spectrum decision is made which involves the
spectrum characterization and also the quality of the service
and users quality requirement are monitored here. Based on
the decision the channel is selected for CR transmission.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 613
Fig 3: Trusted Token Analyzer
3.2 Probabilistic Location Verification
Location verification is an effective defense against attacks
which take advantage of a lack, or compromise, of location
information in the spectrum sensing. Beacon nodes[ Fig 3]
will perform the spectrum observation. Beacon nodes will
collect all the local information and the availability of the
spectrum holes. Beacon nodes will hand over these local ob-
servations to the head node. Head node involves probabilistic
location verification scheme which will in turn locate the loca-
tion of the spectrum holes. The location of the identified spec-
trum hole is indeed verified in probabilistic location verifica-
tion against fake spectrum hole information.
3.3 Trusted Token Analyzer Scheme
The general architecture for traffic management [fig 2] in-
volves a server with trusted token analyzer, Attack resistant
location estimation and location verification. Fig 3 gives the
specific view of the trusted token analyzer scheme. Token
bucket algorithm is used for generating tokens. The bucket
represents a rate-limiting function of the policer on the inter-
face input or output traffic .Each token in the bucket
represents a “credit” for some number of bits, and tokens in
the bucket are “cashed in” for the ability to receive or transmit
traffic that conforms to a rate limit configured for the policer.
The token arrival rate is the fixed bits-per-second rate at which
tokens are added to the token bucket, but only up to the speci-
fied depth of the bucket. Tokens are added based on the in-
formation from the quality monitoring and the primary user
activity monitoring. If both are satisfied a token is added into
the bucket. The token bucket depth defines the capacity of the
bucket in bytes.CR transmission takes place only when there
are sufficient tokens are available in the bucket, thus control-
ling or policing the traffic.
When the sender needs to send a packet to the receiver, it will
confirm the server for the availability of enough tokens. If
enough tokens are available then the sender will send the
packet. If the packet is received by any intermediate node,
then it will analyze the location reference and it will again
confirm the traffic conditions to the server and will then for-
ward the packet to the destination. Once the packet is received
by the intended receiver, it can view the message by opening
the packet.
4. CONCLUSIONS
Spectrum Sensing is performed to identify the spectrum avail-
ability. Each CR performs spectrum sensing to identify the
available spectrum bands and the spectrum decision process
selects from these available bands for opportunistic use. A
framework proposed here is an effective way of managing the
secondary user data transmission by keeping track of the pri-
mary user activity and also the QoS requirement of the sec-
ondary users. The QoS requirement for secondary users is
managed by using trusted token analyzer. Trusted token ana-
lyzer manages the users by controlling the user data traffic.
FUTURE WORK
Cognitive Radio Network is a vast field to study. QoS re-
quirement monitoring for the secondary user is one of the pa-
rameter we are going to focus in future. Also the primary user
emulation attack is another consideration.
REFERENCES
[1]. I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohan-
ty,“Next generation /dynamicspectrum access/cognitive radio
wireless networks: a survey,” Computer Networks: The Inter-
national Journal of Computer and Telecommunications Net-
working, vol. 50 , Issue 13, pp. 2127 – 2159, 2006.
[2]. D. Cabric, S.M. Mishra, and R.W. Brodersen, “Implemen-
tation Issues in Spectrum Sensing for Cognitive Radios,” Proc.
IEEE Asilomar Conf. Signals, Systems and Computers, pp.
772-776, Nov. 2004.
[3]. M.T Masonta, M. Mzyece, N.Ntlatlapa, “Spectrum Deci-
sion in Cognitive Radio Networks: A Survey” IEEE Commu-
nications Surveys and Tutorials, vol. 15, no. 3, pp. 1088-1107
[4]. L. Cao and H. Zheng, “Distributed Spectrum Allocation
via Local Bargaining,” Proc. IEEE Sensor and Ad Hoc Comm.
and Networks (SECON), pp. 475-486, Sept. 2005.
[5]. Jarkko Paavola, “ Operational Challenges for Emerging
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 614
Cognitive Radio Technologies -Wireless Devices Utilizing TV
White Spaces”, Proceeding of the 10th Conference of FRUCT
Association
[6]. R. Etkin, A. Parekh, and D. Tse, “Spectrum Sharing for
Unlicensed Bands,” IEEE J. Selected Areas in Comm., vol.
25, no. 3, pp. 517-528, Apr. 2007.
[7]. T. Chen, H. Zhang, G.M. Maggio, and I. Chlamtac,
“CogMesh: A Cluster-Based Cognitive Radio Network,” Proc.
IEEE Second Symp.New Frontiers in Dynamic Spectrum
Access Networks (DySPAN),pp. 168-178, Apr. 2007
[8]. J. Mitola and G. Q. Maguire, “Cognitive radio: Making
software radios more personal,” IEEE Personal Communica-
tions, vol. 6, no. 4, pp. 13–18, 1999.
[9]. Husheng Li, Ju Bin Song, and Zhu Han; “Transient Anal-
ysis of Data Traffic in Cognitive Radio Networks: A Non-
Equilibrium Statistical Mechanics Approach” ; IEEE Transac-
tions On Wireless Communications, Vol. 12, No. 9, Septem-
ber 2013
[10]. M. Gandetto and C. Regazzoni, “Spectrum Sensing: A
Distributed Approach for Cognitive Terminals,” IEEE J. Se-
lected Areas in Comm., vol. 25, no. 3, pp. 546-557, Apr. 2007.
[11]. L. Cao and H. Zheng, “Distributed Spectrum Allocation
via Local Bargaining,” Proc. IEEE Sensor and Ad Hoc Comm.
and Networks (SECON), pp. 475-486, Sept. 2005
[12]. C.-S. Chang and J.A. Thomas, “Effective bandwidth in
high-speed digital networks”, IEEE Journal on Selected Areas
in Communications, Vol. 13, NO 6, August 1995
[13]. R. Etkin, A. Parekh, and D. Tse, “Spectrum Sharing for
Unlicensed Bands,” IEEE J. Selected Areas in Comm., vol.
25, no. 3, pp. 517-528, Apr. 2007.
[14]. F. Borgonovo, M. Cesana, and L. Fratta, “Throughput
and delay bounds for cognitive transmissions,” Advances Ad
hoc Netw., pp. 179–190, Aug. 2008..
[15]. N. Nie and C. Comaniciu, “Adaptive Channel Allocation
Spectrum Etiquette for Cognitive Radio Networks,” Proc. First
IEEE Int‟l Symp. New Frontiers in Dynamic Spectrum Access
Networks(DySPAN ‟05), pp. 269-278, Nov. 2005.
[16]. N. Nie and C. Comaniciu, “Adaptive Channel Allocation
Spectrum Etiquette for Cognitive Radio Networks,” Proc. First
IEEE Int‟l Symp. New Frontiers in Dynamic Spectrum Access
Networks (DySPAN ‟05), pp. 269-278, Nov. 2005
[17]. C. Peng, H. Zheng, and B.Y. Zhao, “Utilization and
Fairness in Spectrum Assignment for Opportunistic Spectrum
Access,” ACM Mobile Networks and Applications, vol. 11,
no. 4, pp. 555-576, Aug. 2006.
[18]. G. Ganesan, Y.G. Li, Cooperative spectrum sensing in
cognitive radio networks, in: Proc. IEEE DySPAN 2005, No-
vember 2005, pp. 137–143.
[19]. D. Cabric, et. al., A Cognitive Radio Approach for Usage
of Virtual Unlicensed Spectrum. In proc. of 14th IST Mobile
Wireless Communications Summit, Dresden, Germany, June
2005.
[20]. H. Shiang and M. Schaar, “Queuing-Based Dynamic
Channel Selection for Heterogeneous Multimedia Applica-
tions over Cognitive Radio Networks,” IEEE Trans. Multime-
dia, vol. 5,no. 10, pp. 896-909, Aug. 2008.
[21]. T. Harrold, R. Cepeda, and M. Beach, “Long-term mea-
surements of spectrum occupancy characteristics,” in Proceed-
ings of the IEEE DySPAN Conference, 2011, pp. 83–89.
[22]. B. Canberk, I. F. Akyildiz, and S. Oktug, “Primary user
activity modeling using first-difference filter clustering and
correlation in cognitive radio networks,” IEEE/ACM Transac-
tions on Networking, vol. 19, no. 1, pp. 170–183, Feb. 2011.
[23]. Y.-C. Kuo, “Quorum-based power-saving multicast pro-
tocols in the asynchronous ad-hoc network,” Computer Net-
works, vol. 54, pp.1911–1922, 2010
[24]. D. Cabric, S.M. Mishra, D. Willkomm, R. Brodersen,
A.Wolisz, “A Cognitive radio approach for usage of virtual
unlicensed spectrum”, in: Proc. 14th IST Mobile and Wireless
Communications Summit, June 2005.
[25]. L. Cao, H. Zheng, Distributed spectrum allocation via
localVbargaining, in: Proc. IEEE Sensor and Ad Hoc Com-
municationsVand Networks (SECON) 2005, September 2005,
pp.475–486.
[26]. W.-Y. Lee and I. F. Akyildiz, “A spectrum decision
framework for cognitive radio networks,” IEEE Transactions
on Mobile Computing, vol. 10, no. 2, pp. 161–174, Feb. 2011.
[27]. J. Riihijarvi, P. Mahonene, M. Wellens, and M. Gordziel,
“Characterization and modelling of spectrum for dynamic
spectrum access with spatial statistics and random fields,” in
Proc. IEEE 19th Int. Symposium on Personal, Indoor and Mo-
bile Radio Communications, Cannes, Sep.
15–18 2008.
[28]. D. Cabric, S.M. Mishra, R.W. Brodersen, “Implementa-
tion issues in spectrum sensing for cognitive radios”, in: Proc.
38th Asilomar Conference on Signals, Systems and Comput-
ers 2004, November 2004, pp. 772–776.
[29]. M. Hoyhtya, S. Pollin, and A. Mammela, “Improving the
performance of cognitive radios through classification, learn-
ing, and predictive channel selection,” Advances in Electron-
ics and Telecommunications, vol. 2, no. 4, pp. 28–38, Dec.
2011.
[30]. N. Nie and C. Comaniciu, “Adaptive Channel Allocation
Spectrum Etiquette for Cognitive Radio Networks,” Proc. First
IEEE Int‟l Symp. New Frontiers in Dynamic Spectrum Access
Networks (DySPAN ‟05), pp. 269-278, Nov. 2005.
[31]. C. Ghosh, S. Pagadarai, D. Agrawal, and A. Wyglinski,
“A framework for statistical wireless spectrum occupancy
modeling,” IEEE Transactions on Wireless Communications,
vol. 9, no. 1, pp. 38–44, Jan. 2010
[32]. E.Z Tragos, S.Zeadally, A.G. Fragkiadakis, V. A.Siris,
“Spectrum Assignment in Cognitive Radio Networks: A
Comprehensive Survey” , IEEE Communications Surveys &
Tutorials, Accepted For Publication 1
[33].http://www.channelpartnersonline.com/blogs/peertopeer/
2014/01/spectrum-sharing-drives-mobile-market-growth.aspx
[34].http://www.gonzalovazquezvilar.eu/cognitiveradio.htm
[35]. Cognitive Radio Networks: From Theory to Practice
By Ahmed Khattab, Dmitri Perkins, Magdy Bayoumi
[36]. M. Cesana,F. Cuomo, E.Ekici ; “Routing in cognitive
radio networks: Challenges and solutions” Ad Hoc Netwoks
ELSEVIER Volume 9, Issue 3, May 2011.
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 615
[37]. A. A. Daoud, M. Alanyali, and D. Starobinski, “Second-
ary pricing of spectrum in cellular CDMA networks,” in Proc.
IEEE Int. Symposium for New Frontiers in DySPAN, Dublin,
Ireland, Apr. 17–20 2007
[38]. Norfolk State University Norfolk VA 23504 in@nsu.edu
Ma Liangping ; Shen Chi Xin, Chunsheng Dept. of Computer
Science. "Path-Centric Channel Assignment in Cognitive Ra-
dio Wireless Networks ". 2007.
[39]. A. Ghasemi, E.S. Sousa, Collaborative spectrum sensing
for opportunistic access in fading environment, in: Proc. IEEE
DySPAN 2005, November 2005, pp. 131–136.