Cognitive radio (CR) technology has emerged as a realistic solution to the spectrum scarcity
problem in present day wireless networks. A major challenge in CR radio networks is the hidden node
problem, which is the inability of the CR nodes to detect the primary user. This paper proposes energy
detector-based distributed sequential cooperative spectrum sensing over Nakagami-m fading, as a tool to
solve the hidden node problem. The derivation of energy detection performance over Nakagami-m fading
channel is presented. Since the observation represents a random variable, likelihood ratio test (LRT) is
known to be optimal in this type of detection problem. The LRT is implemented using the Neyman-Pearson
Criterion (maximizing the probability of detection but at a constraint of false alarm probability). The
performance of the proposed method has been evaluated both by numerical analysis and simulations. The
effect of cooperation among a group of CR nodes and system parameters such as SNR, detection
threshold and number of samples per CR nodes is investigated. Results show improved detection
performance by implementing the proposed model.
Transferring quantum information through theijngnjournal
Transmission of information in the form of qubits much faster than the speed of light is the important
aspects of quantum information theory. Quantum information processing exploits the quantum nature of
information that needs to be stored, encoded, transmit, receive and decode the information in the form of
qubits. Bosonic channels appear to be very attractive for the physical implementation of quantum
communication. This paper does the study of quantum channels and how best it can be implemented with
the existing infrastructure that is the classical communication. Multiple access to the quantum network is
the requirement where multiple users want to transmit their quantum information simultaneously without
interfering with each others.
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations csandit
The rapidly growing number of wireless communication devices has led to massive increases in
radio traffic density, resulting in a noticeable shortage of available spectrum. To address this
shortage, the Cognitive Radio (CR) technology offers promising solutions that aim to improve
the spectrum utilization. The operation of CR relies on detecting the so-called spectrum holes,
the frequency bands that remain unoccupied by their licensed operators. The unlicensed users
are then allowed to communicate using these spectrum holes. As such, the performance of CR is
highly dependent on the employed spectrum sensing methods. Several sensing methods are
already available. However, no individual method can accommodate all potential CR operation
scenarios. Hence, it is fair to ascertain that the performance of a CR device can be improved if
it is capable of supporting several sensing methods. It should obviously also be able to select the
most suitable method. In this paper, several spectrum sensing methods are compared and
analyzed, aiming to identify their advantages and shortcomings in different CR operating
conditions. Furthermore, it identifies the features that need to be considered while selecting a
suitable sensing method from the catalog of available methods.
Transferring quantum information through theijngnjournal
Transmission of information in the form of qubits much faster than the speed of light is the important
aspects of quantum information theory. Quantum information processing exploits the quantum nature of
information that needs to be stored, encoded, transmit, receive and decode the information in the form of
qubits. Bosonic channels appear to be very attractive for the physical implementation of quantum
communication. This paper does the study of quantum channels and how best it can be implemented with
the existing infrastructure that is the classical communication. Multiple access to the quantum network is
the requirement where multiple users want to transmit their quantum information simultaneously without
interfering with each others.
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations csandit
The rapidly growing number of wireless communication devices has led to massive increases in
radio traffic density, resulting in a noticeable shortage of available spectrum. To address this
shortage, the Cognitive Radio (CR) technology offers promising solutions that aim to improve
the spectrum utilization. The operation of CR relies on detecting the so-called spectrum holes,
the frequency bands that remain unoccupied by their licensed operators. The unlicensed users
are then allowed to communicate using these spectrum holes. As such, the performance of CR is
highly dependent on the employed spectrum sensing methods. Several sensing methods are
already available. However, no individual method can accommodate all potential CR operation
scenarios. Hence, it is fair to ascertain that the performance of a CR device can be improved if
it is capable of supporting several sensing methods. It should obviously also be able to select the
most suitable method. In this paper, several spectrum sensing methods are compared and
analyzed, aiming to identify their advantages and shortcomings in different CR operating
conditions. Furthermore, it identifies the features that need to be considered while selecting a
suitable sensing method from the catalog of available methods.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Implementation of a bpsk modulation based cognitive radio system using the en...csandit
We present in this work an energy detection algorit
hm, based on spectral power estimation, in
the context of cognitive radio. The algorithm is ba
sed on the Neyman-Pearson test where the
robustness of the appropriate spectral bands identi
fication, is based, at one hand, on the
‘judicious’ choice of the probability of detection
(P
D
) and false alarm probability (P
F
). First, we
accomplish a comparative study between two techniqu
es for estimation of PSD (Power Spectral
Density): the periodogram and Welch methods. Also,
the interest is focused on the choice of the
optimal duration of observation where we can state
that this latter one should be inversely
proportional to the level of the SNR of the transmi
tted signal to be sensed. The developed
algorithm is applied in the context of cognitive ra
dio. The algorithm aims to identify the free
spectral bands representing, reserved for the prima
ry user, of the signal carrying information,
issued from an ASCII encoding alphanumeric message
and utilizing the BPSK modulation,
transmitted through an AWGN (Added White Gaussian N
oise) channel. The algorithm succeeds
in identifying the free spectral bands even for low
SNR levels (e.g. to -2 dB) and allocate them
to the informative signal representing the secondar
y user.
SPECTRUM SENSING STRATEGY TO ENHANCE THE QOS IN WHITE-FI NETWORKSIJCNC Journal
The rapidly growing number of wireless devices running applications that require high bandwidths, has
resulted in increasing demands for the unlicensed frequency spectrum. Given the scarcity of allocated
unlicensed frequencies, meeting such demands can become a serious concern. Cognitive Radio (CR)
technology opens the door for the opportunistic use of the licensed spectrum to partially address the issues
relevant to the limited availability of unlicensed frequencies. Combining CR and Wi-Fi to form the socalled
White-Fi networks, has been proposed for achieving higher spectrum utilization. This article
discusses the spectrum sensing in White-Fi networks and the impacts that it has on the QoS of typical
applications. It also reports the analysis of such impacts through various simulation studies. Our results
demonstrate the advantages of an adaptive sensing strategy that is capable of changing the related
parameters based on QoS requirements. We also propose such a sensing strategy that can adapt to the
IEEE 802.11e requirements. The goal of the proposed strategy is the enhancement of the overall QoS of the
applications while maintaining efficient sensing of the spectrum. Simulation results of the scenarios that
implement the proposed mechanisms demonstrate noticeable QoS improvements compared to cases where
common sensing methods are utilized in IEEE802.11 networks.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The cognitive radio prototype performance is to alleviate the scarcity of spectral resources for wireless communication through intelligent sensing and quick resource allocation techniques. Secondary users (SU’s) actively obtain the spectrum access opportunity by supporting primary users (PU’s) in cognitive radio networks (CRNs). In present generation, spectrum access is endowed through cooperative communication-based link-level frame-based cooperative (LLC) principle. In this SUs independently act as conveyors for PUs to achieve spectrum access opportunities. Unfortunately, this LLC approach cannot fully exploit spectrum access opportunities to enhance the throughput of CRNs and fails to motivate PUs to join the spectrum sharing processes. Therefore, to overcome this con, network level cooperative (NLC) principle was used, where SUs are integrated mutually to collaborate with PUs session by session, instead of frame based cooperation for spectrum access opportunities. NLC approach has justified the challenges facing in LLC approach. In this paper we make a survey of some models that have been proposed to tackle the problem of LLC. We show the relevant aspects of each model, in order to characterize the parameters that we should take in account to achieve a spectrum access opportunity.
A cognitive radio and dynamic spectrum access – a studyijngnjournal
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the
demand of future services. While all of the radio spectrum is allocated to different services, applications
and users, observation show that usage of the spectrum is actually quite low. To overcome this problem
and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication,
in which a transmitter and receiver can detect intelligently communication channels that are in use and
those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes
possible the use of available radio frequency spectrum while minimizing interference with other users. CRs
must have the capability to learn and adapt their wireless transmission according to the surrounding radio
environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising
since they have a great importance for the implementation of Cognitive Radio networks architecture.
Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless
communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to
the actual licensees. This paper is a review and comparison of different DSA models and methods.
A Cognitive Radio And Dynamic Spectrum Access – A Studyjosephjonse
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the demand of future services. While all of the radio spectrum is allocated to different services, applications and users, observation show that usage of the spectrum is actually quite low. To overcome this problem and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication, in which a transmitter and receiver can detect intelligently communication channels that are in use and those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes possible the use of available radio frequency spectrum while minimizing interference with other users. CRs must have the capability to learn and adapt their wireless transmission according to the surrounding radio environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising since they have a great importance for the implementation of Cognitive Radio networks architecture. Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to the actual licensees. This paper is a review and comparison of different DSA models and methods.
IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...cscpconf
We present in this work an energy detection algorithm, based on spectral power estimation, in
the context of cognitive radio. The algorithm is based on the Neyman-Pearson test where the
robustness of the appropriate spectral bands identification, is based, at one hand, on the
‘judicious’ choice of the probability of detection (PD) and false alarm probability (PF). First, we
accomplish a comparative study between two techniques for estimation of PSD (Power Spectral
Density): the periodogram and Welch methods. Also, the interest is focused on the choice of the
optimal duration of observation where we can state that this latter one should be inversely
proportional to the level of the SNR of the transmitted signal to be sensed. The developed
algorithm is applied in the context of cognitive radio. The algorithm aims to identify the free
spectral bands representing, reserved for the primary user, of the signal carrying information,
issued from an ASCII encoding alphanumeric message and utilizing the BPSK modulation,
transmitted through an AWGN (Added White Gaussian Noise) channel. The algorithm succeeds
in identifying the free spectral bands even for low SNR lev
Simulation and analysis of cognitive radioijngnjournal
The increasing demand of wireless applications has put a lot of limitations on the use of available
radio spectrum is limited and precious resource. Many survey of spectrum utilization shows that entire
spectrum is not used at all the times, so many of the radio spectrum is underutilized. Some of the frequency
bands in the spectrum are unoccupied, some of the frequency bands less occupied and few bands are over
utilized. Cognitive radio system is a technique which overcomes that spectrum underutilization. Cognitive
radio is a technique where secondary user looks for a free band to use when primary user is not in use of
its licensed band. A function of cognitive radio is called Spectrum sensing which enables to search for the
free bands and it helps to detect the spectrum hole (frequency band which is free enough to be used) which
can be utilized by secondary user with high spectral resolution capability. The idea of simulation and
analysis of Cognitive Radio System to reuse unused spectrum to increase the total system capacity was
brought in this paper and this work digs into the practical implementation of a Cognitive radio system.
MATLAB R2007b (version7.5) has been used to test the performance of Cognitive radio dynamically.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Implementation of a bpsk modulation based cognitive radio system using the en...csandit
We present in this work an energy detection algorit
hm, based on spectral power estimation, in
the context of cognitive radio. The algorithm is ba
sed on the Neyman-Pearson test where the
robustness of the appropriate spectral bands identi
fication, is based, at one hand, on the
‘judicious’ choice of the probability of detection
(P
D
) and false alarm probability (P
F
). First, we
accomplish a comparative study between two techniqu
es for estimation of PSD (Power Spectral
Density): the periodogram and Welch methods. Also,
the interest is focused on the choice of the
optimal duration of observation where we can state
that this latter one should be inversely
proportional to the level of the SNR of the transmi
tted signal to be sensed. The developed
algorithm is applied in the context of cognitive ra
dio. The algorithm aims to identify the free
spectral bands representing, reserved for the prima
ry user, of the signal carrying information,
issued from an ASCII encoding alphanumeric message
and utilizing the BPSK modulation,
transmitted through an AWGN (Added White Gaussian N
oise) channel. The algorithm succeeds
in identifying the free spectral bands even for low
SNR levels (e.g. to -2 dB) and allocate them
to the informative signal representing the secondar
y user.
SPECTRUM SENSING STRATEGY TO ENHANCE THE QOS IN WHITE-FI NETWORKSIJCNC Journal
The rapidly growing number of wireless devices running applications that require high bandwidths, has
resulted in increasing demands for the unlicensed frequency spectrum. Given the scarcity of allocated
unlicensed frequencies, meeting such demands can become a serious concern. Cognitive Radio (CR)
technology opens the door for the opportunistic use of the licensed spectrum to partially address the issues
relevant to the limited availability of unlicensed frequencies. Combining CR and Wi-Fi to form the socalled
White-Fi networks, has been proposed for achieving higher spectrum utilization. This article
discusses the spectrum sensing in White-Fi networks and the impacts that it has on the QoS of typical
applications. It also reports the analysis of such impacts through various simulation studies. Our results
demonstrate the advantages of an adaptive sensing strategy that is capable of changing the related
parameters based on QoS requirements. We also propose such a sensing strategy that can adapt to the
IEEE 802.11e requirements. The goal of the proposed strategy is the enhancement of the overall QoS of the
applications while maintaining efficient sensing of the spectrum. Simulation results of the scenarios that
implement the proposed mechanisms demonstrate noticeable QoS improvements compared to cases where
common sensing methods are utilized in IEEE802.11 networks.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The cognitive radio prototype performance is to alleviate the scarcity of spectral resources for wireless communication through intelligent sensing and quick resource allocation techniques. Secondary users (SU’s) actively obtain the spectrum access opportunity by supporting primary users (PU’s) in cognitive radio networks (CRNs). In present generation, spectrum access is endowed through cooperative communication-based link-level frame-based cooperative (LLC) principle. In this SUs independently act as conveyors for PUs to achieve spectrum access opportunities. Unfortunately, this LLC approach cannot fully exploit spectrum access opportunities to enhance the throughput of CRNs and fails to motivate PUs to join the spectrum sharing processes. Therefore, to overcome this con, network level cooperative (NLC) principle was used, where SUs are integrated mutually to collaborate with PUs session by session, instead of frame based cooperation for spectrum access opportunities. NLC approach has justified the challenges facing in LLC approach. In this paper we make a survey of some models that have been proposed to tackle the problem of LLC. We show the relevant aspects of each model, in order to characterize the parameters that we should take in account to achieve a spectrum access opportunity.
A cognitive radio and dynamic spectrum access – a studyijngnjournal
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the
demand of future services. While all of the radio spectrum is allocated to different services, applications
and users, observation show that usage of the spectrum is actually quite low. To overcome this problem
and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication,
in which a transmitter and receiver can detect intelligently communication channels that are in use and
those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes
possible the use of available radio frequency spectrum while minimizing interference with other users. CRs
must have the capability to learn and adapt their wireless transmission according to the surrounding radio
environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising
since they have a great importance for the implementation of Cognitive Radio networks architecture.
Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless
communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to
the actual licensees. This paper is a review and comparison of different DSA models and methods.
A Cognitive Radio And Dynamic Spectrum Access – A Studyjosephjonse
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the demand of future services. While all of the radio spectrum is allocated to different services, applications and users, observation show that usage of the spectrum is actually quite low. To overcome this problem and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication, in which a transmitter and receiver can detect intelligently communication channels that are in use and those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes possible the use of available radio frequency spectrum while minimizing interference with other users. CRs must have the capability to learn and adapt their wireless transmission according to the surrounding radio environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising since they have a great importance for the implementation of Cognitive Radio networks architecture. Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to the actual licensees. This paper is a review and comparison of different DSA models and methods.
IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...cscpconf
We present in this work an energy detection algorithm, based on spectral power estimation, in
the context of cognitive radio. The algorithm is based on the Neyman-Pearson test where the
robustness of the appropriate spectral bands identification, is based, at one hand, on the
‘judicious’ choice of the probability of detection (PD) and false alarm probability (PF). First, we
accomplish a comparative study between two techniques for estimation of PSD (Power Spectral
Density): the periodogram and Welch methods. Also, the interest is focused on the choice of the
optimal duration of observation where we can state that this latter one should be inversely
proportional to the level of the SNR of the transmitted signal to be sensed. The developed
algorithm is applied in the context of cognitive radio. The algorithm aims to identify the free
spectral bands representing, reserved for the primary user, of the signal carrying information,
issued from an ASCII encoding alphanumeric message and utilizing the BPSK modulation,
transmitted through an AWGN (Added White Gaussian Noise) channel. The algorithm succeeds
in identifying the free spectral bands even for low SNR lev
Simulation and analysis of cognitive radioijngnjournal
The increasing demand of wireless applications has put a lot of limitations on the use of available
radio spectrum is limited and precious resource. Many survey of spectrum utilization shows that entire
spectrum is not used at all the times, so many of the radio spectrum is underutilized. Some of the frequency
bands in the spectrum are unoccupied, some of the frequency bands less occupied and few bands are over
utilized. Cognitive radio system is a technique which overcomes that spectrum underutilization. Cognitive
radio is a technique where secondary user looks for a free band to use when primary user is not in use of
its licensed band. A function of cognitive radio is called Spectrum sensing which enables to search for the
free bands and it helps to detect the spectrum hole (frequency band which is free enough to be used) which
can be utilized by secondary user with high spectral resolution capability. The idea of simulation and
analysis of Cognitive Radio System to reuse unused spectrum to increase the total system capacity was
brought in this paper and this work digs into the practical implementation of a Cognitive radio system.
MATLAB R2007b (version7.5) has been used to test the performance of Cognitive radio dynamically.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
With cloud computing, users can remotely store their data into the cloud and use on-demand high-quality applications. Data outsourcing: users are relieved from the burden of data storage and maintenance When users put their data (of large size) on the cloud, the data integrity protection is challenging enabling public audit for cloud data storage security is important Users can ask an external audit party to check the integrity of their outsourced data. Purpose of developing data security for data possession at un-trusted cloud storage servers we are often limited by the resources at the cloud server as well as at the client. Given that the data sizes are large and are stored at remote servers, accessing the entire file can be expensive in input output costs to the storage server. Also transmitting the file across the network to the client can consume heavy bandwidths. Since growth in storage capacity has far outpaced the growth in data access as well as network bandwidth, accessing and transmitting the entire archive even occasionally greatly limits the scalability of the network resources. Furthermore, the input output to establish the data proof interferes with the on-demand bandwidth of the server used for normal storage and retrieving purpose. The Third Party Auditor is a respective person to manage the remote data in a global manner.
Hybrid Spectrum Sensing Method for Cognitive Radio IJECEIAES
With exponential rise in the internet applications and wireless communications, higher and efficient data transfer rates are required. Hence proper and effective spectrum is the need of the hour, As spectrum demand increases there are limited number of bands available to send and receive the data. Optimizing the use of these bands efficiently is one of the tedious tasks. Various techniques are used to send the data at same time, but for that we have to know which bands are free before sending the data. For this purpose various spectrum sensing approaches came with variety of solutions. In this paper the sensing problem is tackled with the use of hybrid spectrum sensing method, This new networking paradox uses the Centralized concept of spectrum sensing and creates one of the most trusted spectrums sensing mechanism. This proposed technique is simulated using MATLAB software.This paper also provides comparative study of various spectrum sensing methodologies.
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...IOSR Journals
Abstract : In cognitive radio, spectrum sensing is an emergent technology to find available and unused spectrum for increasing spectrum utilization and to overcome spectrum scarcity problem without harmful interference to licensed users. Cooperative spectrum sensing is used to give reliable performance in terms of detection probability and false alarm probability as well as in order to reduce fading, noise and shadowing effects on cognitive radio users. In this paper according to detection performance and complexity various cooperative spectrum sensing schemes have been discussed. We have analyzed spectrum sensing with different fusion rules and their comparative behavior has also been studied. Furthermore, we introduced AND-OR fusion rules in 2-bit and 3-bit hard combination schemes. Keywords - Cognitive radio, cooperative spectrum sensing, energy detector, spectrum sensing, hard combination
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...IOSR Journals
In cognitive radio, spectrum sensing is an emergent technology to find available and unused
spectrum for increasing spectrum utilization and to overcome spectrum scarcity problem without harmful
interference to licensed users. Cooperative spectrum sensing is used to give reliable performance in terms of
detection probability and false alarm probability as well as in order to reduce fading, noise and shadowing
effects on cognitive radio users. In this paper according to detection performance and complexity various
cooperative spectrum sensing schemes have been discussed. We have analyzed spectrum sensing with different fusion rules and their comparative behavior has also been studied. Furthermore, we introduced AND-OR fusion rules in 2-bit and 3-bit hard combination schemes
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOijngnjournal
Cognitive radio (CR) is a new paradigm that utilizes the available spectrum band. The key characteristic of CR system is to sense the electromagnetic environment to adapt their operation and dynamically vary its radio operating parameters. The technique of dynamically accessing the unused spectrum band is known as Dynamic Spectrum Access (DSA). The dynamic spectrum access technology helps to minimize unused spectrum bands. In this paper, main functions of Cognitive Radio (CR) i.e. spectrum sensing, spectrum management, spectrum mobility and spectrum sharing are discussed. Then DSA models are discussed along with different methods of DSA such as Command and Control, Exclusive-Use, Shared Use of Primary Licensed User and Commons method. Game-theoretic approach using Bertrand game model, Markovian Queuing Model for spectrum allocation in centralized architecture and Fuzzy logic based method are also discussed and result are shown.
Bio-inspired route estimation in cognitive radio networks IJECEIAES
Cognitive radio is a technique that was originally created for the proper use of the radio electric spectrum due its underuse. A few methods were used to predict the network traffic to determine the occupancy of the spectrum and then use the ‘holes’ between the transmissions of primary users. The goal is to guarantee a complete transmission for the second user while not interrupting the trans-mission of primary users. This study seeks the multifractal generation of traffic for a specific radio electric spectrum as well as a bio-inspired route estimation for secondary users. It uses the MFHW algorithm to generate multifractal traces and two bio-inspired algo-rithms: Ant Colony Optimization and Max Feeding to calculate the secondary user’s path. Multifractal characteristics offer a predic-tion, which is 10% lower in comparison with the original traffic values and a complete transmission for secondary users. In fact, a hybrid strategy combining both bio-inspired algorithms promise a reduction in handoff. The purpose of this research consists on deriving future investigation in the generation of multifractal traffic and a mobility spectrum using bio-inspired algorithms.
An Approach to Spectrum Sensing in Cognitive Radio IOSR Journals
Recent research shows that more than 70% of the available spectrum is not utilized
efficiently. The bandwidth becomes expensive due to a shortage of frequencies. Therefore for efficient
utilization of spectrum, we need to sniff the spectrum to determine whether it is being used by primary user or
not. The term cognitive radio refers to the adoption of radio parameters using the sensed information
of the spectrum. There are various spectrum sensing techniques proposed in the literature but still there is
room for researchers in this field to explore more sophisticated approaches. There are three major
categories of spectrum sensing techniques; transmitter detection, receiver detection and interference
temperature detection. This thesis presents a survey of techniques suggested in the literature for
spectrum sensing with a performance analysis of transmitter-based detection techniques.
An Approach to Spectrum Sensing in Cognitive RadioIOSR Journals
Abstract: Recent research shows that more than 70% of the available spectrum is not utilized efficiently. The bandwidth becomes expensive due to a shortage of frequencies. Therefore for efficient utilization of spectrum, we need to sniff the spectrum to determine whether it is being used by primary user or not. The term cognitive radio refers to the adoption of radio parameters using the sensed information of the spectrum. There are various spectrum sensing techniques proposed in the literature but still there is room for researchers in this field to explore more sophisticated approaches. There are three major categories of spectrum sensing techniques; transmitter detection, receiver detection and interference temperature detection. This thesis presents a survey of techniques suggested in the literature for spectrum sensing with a performance analysis of transmitter-based detection techniques. Keywords— Include at least 5 keywords or phrases
Single User Eigenvalue Based Detection For Spectrum Sensing In Cognitive Rad...IJMER
Scarcity of spectrum is the issue that wireless communication technology has to deal with.
Primary user is the licensed user of the spectrum. When primary user is idle or not using the spectrum
secondary user can utilize the spectrum. This sharing of spectrum can be enabled by cognitive radio
(CR) technology. The heart of enabling this technology is spectrum sensing. Spectrum sensing involves
detection of primary signal at very low SNR (in the range of -20 dB), under noise and interference
uncertainty. This requirement makes spectrum sensing, a hard nut to crack. Another major issue in
detection is hidden node problem wherein the node in vicinity of primary transmitter also indicates
absence of the primary signal since it is hidden behind the large object. There are various algorithms
for detection viz. energy detection, matched filter detection, feature detection (cyclostationary
detection, eigen-value based detection etc.) These algorithms have limitations of complexity,
requirement of signal knowledge and detection performance. In this paper the performance of
eigenvalue based detection (EBD) method in presence of noise and low SNR of the received signal has
been evaluated for a single user.
Comparative Study of Different Non-Cooperative Techniques in Cognitive RadioRSIS International
Wireless technology is expanding its domain and with it
is growing the need for more frequencies for communication.
Cognitive radio offers a solution to this problem by using the
concept of Dynamic spectrum access instead of fixed spectrum
allocation. Such radios are capable of sensing the RF spectrum
for identifying idle frequency bands. It then transmits
opportunistically so as to avoid interference with primary user
over same band. In cognitive radio, intelligent spectrum sensing
forms the major and most important part. Out of the various
sensing techniques, we will give an overview of some of the
prominent non-cooperative techniques. The paper deals with
comparative study of these methods.
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
2. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 3, September 2017 : 1127 – 1136
1128
Due to shadowing and deep fading effects in wireless communications, or when the
cognitive radio nodes are located further away from the primary user, the signal power received
by the cognitive radio node from the primary user terminals can become very low such that the
primary user is unable to be detected. The inability of the CR nodes to detect the PU in such a
scenario is known as the hidden node problem in CR.
The rest of the paper is organized as follows. In Section 2, the motivation regarding this
research and review of the current related literature are presented. Section 3 discusses the
system model, the basic principle and criteria used in statistical decision theory are presented.
Simulation and results are covered in Section 4, and finally, we conclude the paper in Section 5.
2. Motivation and Related Work
The increasing demand for additional bandwidth to support existing and new services
has led to the current spectrum scarcity and spectrum underutilization. Three main paths shape
the research study embarked by wireless communication practitioners over the last decades to
arrive at an effective spectrum sensing mechanism, namely transmitter detection or non-
cooperative techniques, cooperative detection techniques and interference based detection
techniques. The transmitter detection techniques comprise of energy detection, cyclostationary
detection and matched filter detection [6]. These methods are classified further as coherent and
non-coherent, meaning that they have either complete, partial or no a priori knowledge of the
primary transmitter respectively [7]. Cooperative schemes consist of centralized, distributed and
relay assisted or cluster based detection techniques. While transmitter and cooperative
detection techniques “sniff” the spectrum to minimize primary transmitter interference;
interference based detection aim at minimizing interference to the primary receiver. In non-
cooperative sensing [8], each secondary user (SU) depends solely on its ability to detect the
presence of a primary user (PU) transmission on a specific spectrum band. Energy detection
[9], [10, 11] was proposed in literature as a method of detecting the presence of a PU
transmission without cooperation between the SUs. In energy detection, prior knowledge about
the PU is not required to determine if the channel is occupied or not. It has the advantage of low
computational complexity and easy to implement, [12, 13]. However, the detection performance
suffers from two major drawbacks, 1) the sensing node inability to detect the noise variance.
Thus, the SU may experience false-alarm particularly in noisy environments. 2) Silence
synchronization: the sensing node inability to distinguish between a PU transmission and
another SU transmission.
In a cognitive radio system, the authors in [14] established that cooperative sensing
improves the reliability of detecting a PU and also capable of combating the hidden node
problem in deep fading and shadowing channel. The article in [3] resolved that there is always a
compromise between detection performance and shadowing, receiver uncertainty problem and
multipath fading. Therefore to combat this problem, by exploiting spatial diversity, cooperative
spectrum sensing will improve detection performance significantly.
Distributed cooperative spectrum sensing is a well-researched area in the literature of
wireless sensor networks (WSNs) [1], [15-19]. We can adopt such detection strategy in the
context of CR networks. The authors in [20] discuss wideband detection by focusing on multiple
frequency bands using distributed methods. Noisy reporting channels between each CR node
for distributed sensing strategy is addressed in [21]. Energy-efficient distributed sensing and
access scheme are presented in [22], while distributed spectrum sensing security issues are
addressed in [23]. An implementation model and procedure using SDR for actualizing
distributed sensing are presented in [24].
The Nakagami-m distribution model [25], gives the best fit to indoor mobile and mobile
multipath propagation [26-29]. While energy detection distributed spectrum sensing have been
studied extensively in the last years, performance using the proposed mathematical approach is
relatively less investigated. Thus, this paper proposes distributed sequential cooperative
spectrum sensing over Nakagami-m fading for solving the hidden node problem in cognitive
radio networks.
3. TELKOMNIKA ISSN: 1693-6930
A Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks (Felix Obite)
1129
3. System Model
This section presents the system model for energy detector-based distributed
sequential cooperative sensing over Nakagami-m fading channel. The basic principle and
criteria used in statistical decision theory are investigated. The derivation of energy detection
performance over Nakagami-m fading channel is revisited.
With distributed sequential sensing model [30-33], the CR senses the spectrum and
sends the information to the next CR in a sequential pattern. As shown in Figure 1, the ( 1)th
n
CR node senses the spectrum and sends the information to the adjacent ( )th
n CR node, which
then fuses the 1nd
received information with its own ny local sensing information and sends it
to the next ( 1)th
n CR node. Using such structure, the last node in the sequence ( )th
N node gives
a final binary decision on the primary user presence.
Figure 1. Distributed sequential spectrum sensing
Using the likelihood function, the detection criteria is formulated and presented
subsequently.
The ( 1)th
n node gives a binary decision using its own sensing and received information
from its previous node denoted by 1 1nd if its decision is 1H and 1 0nd if its decision is 0H .
Suppose ny and 1nd joint distributions under hypotheses 0H and 1H are given by the
expression , 1 0
1 0( , )n n |Hy d n nf y d |H and , 1 1
1 1( , )n n |Hy d n nf y d | H respectively, hence the likelihood
ratio may be expressed as [30]:
1 1
1 0
, 1 1
1
, 1 0
( , )
( , )
( , )
n n |H
n n |H
y d n n
n n
y d n n
f y d | H
y d
f y d | H
(1)
The expression can be remodified by assuming conditional independence between ny and
1nd as [30]:
1 1
1 0
, 1 1 , 1 1 , 1 1
1
, 1 0 , 1 1 , 1 1
( , )[ ( 1) (1 ) ( )]
( , )
( , )[ ( 1) (1 ) ( )]
n n |H
n n |H
y d n n d n n d n n
n n
y d n n fa n n fa n n
f y d | H P d P d
y d
f y d | H P d P d
(2)
Where the probability of detection is , 1d nP and the probability of false alarm is , 1fa nP at the
( 1)th
n CR node respectively, which is given by:
, 1 1 1{ 1 }d n r nP P d | H (3)
4. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 3, September 2017 : 1127 – 1136
1130
, 1 1 0{ 1 }fa n r nP P d | H (4)
And ( )x denotes the dirac delta function expressed as ( ) 1x for 0x and
( ) 0x for 1x . Thus, based on 1nd received information, the th
n CR node may have two
detection criteria expressed as:
1
1 1
01 0
, 1 1 , 1
1 1
, 1 0 , 1
( , )
1
( , )
n n |H
n n |H
H
y d n n d n >
< n
Hy d n n fa n
f y d | H P
for d
f y d | H P
(5)
1
1 1
01 0
, 1 1 , 1
2 1
, 1 0 , 1
( , )(1 )
0
( , )(1 )
n n |H
n n |H
H
y d n n d n >
< n
Hy d n n fa n
f y d | H P
for d
f y d | H P
(6)
Based on the distribution models considered in the system, 1 2and are detection
thresholds that can be determined.
3.1. Performance Metrics
Based on the binary hypothesis, the performance of energy detector is categorized by
the following metrics.
1. Probability of detection ( )dP : probability of deciding that the signal is present when
1H is true, given by [30]:
1dP > | H (7)
2. Probability of false alarm ( )faP : probability of deciding that the signal is present
while in actual sense 0H is true, given by:
0PrfaP > | H (8)
In cognitive radio context, a false alarm indicates undetected spectrum holes. Thus a high faP
value signifies low spectrum usage by SUs.
1. Probability of missed detection ( )mdP : probability of deciding that the signal is
absent when 1H is true, given by:
1PrmdP < | H (9)
Which is the same as detecting a spectrum hole when there is none. By consequence, a high
mdP value implies unexpected interference to PUs.
3.2. Detection Performance
Looking at the detection and false alarm probabilities, we can now evaluate the
detection performance of the distributed sequential spectrum sensing. Suppose the th
n CR
node made a decision nd given by [30]:
5. TELKOMNIKA ISSN: 1693-6930
A Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks (Felix Obite)
1131
, 1
, 1
1
0
n
n
y n
n
y n
if d
d
if d <
(10)
Depending on 1nd , can be 1 or 2 , then the detection and false alarm
probabilities are expressed as:
, 1 , 1 1 , 1P { 1 }(1 ) P { 1 }d n r n d n r n d nP d | H P d | H P (11)
, 0 , 1 0 , 1{ 1 }(1 ) { 1 }fa n r n fa n r n fa nP P d | H P P d | H P (12)
Since the observations represent random variables, from statistical decision theory,
Likelihood ratio test (LRT) is known to be optimal in this type of detection problem [34]. The LRT
is implemented using Neyman-Pearson Criterion (maximizing probability of detection but at
constraint of false alarm probability)
3.3. Neyman-Pearson Criterion
A complete statistical description or analysis of the received signal and noise is required
by the Neyman-Pearson detector to predict the presence or absence of a primary signal [35].
The detector may not have a priori information of the received signal and even if available the
signal may be varying with time (not stationary).
The Neyman-Pearson Criterion [35] demands that faP kept fixed to a certain value
and dP is maximized. Since the probability of miss detection 1 ,md dP P minimizing mdP is
equal to maximizing dP . dP is maximized subject to faP constraint. The decision
rule is [26]:
1
1
00
Y| 1
Y| 0
( | )
( )
( | )
H
H >
<
HH
f y H
y
f y H
(13)
As the threshold is varied, the regions representing dP and faP also varies. For a
given probability of false alarm, the probability of detection increases. Since ( )y is a random
variable, and the Neyman-Pearson’s receiver use the likelihood ratio test, then dP and faP may
be expressed as:
11 1 1( ) ( )d |HP Decide H | H true f | H d
(14)
And
01 0 0( ) ( )fa |HP Decide H | H true f | H d
(15)
3.4. Threshold Detection
The received signal is compared to a threshold value and the detector decides the
presence of a primary signal when the signal exceeds the threshold, otherwise it declares the
absence of a primary signal. ( )y represent a ratio of two negative quantities, 1 1( )Y|Hf y|H and
0 0( )Y|Hf y|H , hence takes a value from zero to infinity. When the threshold is zero ( 0) , 1H
hypothesis is true, and 1d faP P .Similarly, when the threshold tends to infinity ( ) ,
0H hypothesis is true, and 0d faP P [26].
6. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 3, September 2017 : 1127 – 1136
1132
The receiver operating characteristic (ROC) slope at a specific location on the curve
specifies the threshold in order to attain dP and faP at that location or point using the Neyman-
Pearson test [35].
With respect to the threshold and taking the derivative of equation (14) and (15),
we obtain:
1 11 1( ) ( )d
|H |H
dP d
f | H d f | H
d d
(16)
0 00 0( ) ( )fa
|H |H
dP d
f | H d f | H
d d
(17)
Also,
1 01 1 0( ) ( ) ( ) ( ) ( )d |H |HP P y | H f y | H d y f y | H d
(18)
Again with respect to the threshold , a derivative of the above equation is taken to obtain,
1|H 0( | H )ddP
f
d
(19)
Combining (16), (17) and (18), yields:
1
0
1
0
( )
( )
|H
|H
f | H
f | H
(20)
d
fa
dP
DP
(21)
3.5. Nakagami-m Fading Channel
In a Nakagami fading channel, the probability density function is given by [30]:
11
( ) exp 0
( )
m
mm m
f for
m
(22)
Where [ ]E and m is the Nakagami parameter. Also, the closed-form expression for the
probability of detection is given by [8]:
1
1 1 1
1
( 2) (1 )
exp ;1 ;
2 2
uN
m
d
u
P A F m u
u
(23)
Where / ( )m m and 1 1(.;.;.)F represents the confluent hypergeometric function.
Also, 1A for integer values of m is expressed as:
2
1
1 1
0
(1 ) (1 )
exp (1 )
2 2 2
m
m i
m i
i
A L L
m
(24)
Where the Laguerre polynomial of degree i is (.)iL .
7. TELKOMNIKA ISSN: 1693-6930
A Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks (Felix Obite)
1133
Also, a closed-form expression for the probability of detection for Nakagami-m fading
channel considering Gamma distributed shadowing model is expressed as [36]:
1
2
0 1
( ) ( )1
exp( ) ( ) ; 1;
( ) 2 ( 1)
k n su
s
d
s n s
mm m
P s k U s k k m
k n!s! n
2
2
0 0
1( 1) ( ) ( )
; 2;
1
t t vm
t v
mv k m
U v k k t m
m vt!v!
2
2
0 0 0
( 1) ( )
( 1) 1; 1;
s a sm n
s n a
n m
a k U a k k s n
n aa!s!
(25)
For the special case of 1m the Nakagami fading tends to Rayleigh fading. For >1m ,
the signal fluctuations reduces compared to Rayleigh fading and Nakagami fading tends to
Rician fading. The Nakagami-m distribution model is a general model which is used widely to
describe several fading environments [37].
4. Results and Analysis
In this section, simulation results are presented to evaluate the proposed model. The
fading and shadowing effects are considered in the simulation. The cooperative nodes are
assumed to be distributed sequentially according to the system model.
In order to plot the ROC curves, one parameter is varied while the other parameter is
fixed. This allows the assessment of different scenario of interest. The simulation parameters
employed are: number of CR users, number of collected samples (n), number of Monte Carlo
events = 10,000, variable SNR and decision threshold. Since the Nakagami fading includes
both Raleigh and Rician fading, the Nakagami channel model has been selected for
synthesizing the channel (Nakagami fading = 1). The threshold is obtained according to
equation (21).
As shown in Figure 2, there is an improved detection performance with increasing
number of collected samples and increasing number of CR users (cooperative nodes).
The same parameters are also used to assess the effect of against threshold
over Nakagami-m fading as shown in Figure 3. As evident, for a higher maximum threshold, the
smaller the value of . Similarly, the smaller the minimum threshold,
increases. Thus, the threshold is treated as an optimization problem, for this study the threshold
was set at 0.8 based on the Neman Pearson criterion.
Figure 2. d faP vs P curves over Nakagami-m fading for variable number of samples (n) and
variable number of CR users (cooperative nodes)
8. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 3, September 2017 : 1127 – 1136
1134
Figure 3. d faP and P versus variable decision threshold
Finally, the same scenario is used to assess the probability distribution of the system as
a function of SNR by showing the probability density function for a fixed threshold value versus
variable threshold. Figure 4 and 5 shows the PDF of the test statistic or likelihood ratio obtained
from the simulation model using energy detection. The histogram depicts hypothesis.
0H (Primary user absent) and hypothesis 1H (primary user present). One can observe
that the detection performance of Figure 4 is very low considering low SNR (-10 dB). The same
situation is used for Figure 5 but the SNR is increased to (0 dB), one can easily see that the dP
increases with increase in SNR value, considering that the area representing the histogram
under 1H increases. The overall conclusion is that for a given reduced , there is an
increased or improved dP . Thus consistent with results in literature.
Figure 4. Probability density functions of the
test statistic versus variable threshold
Figure 5. Probability density functions of the
test statistic versus variable threshold
5. Conclusion
This research paper has studied and proposed a detection technique capable of solving
the hidden node problem. The study also reviewed extensively statistical decision theory in
relation to spectrum sensing for cognitive radio networks. The derivation of energy detection
performance for different types of fading channels have been revisited. We derived closed-form
expressions for the probability of detection, the probability of false alarm, over Nakagami-m
fading considering Gamma distributed shadowing model for the proposed system. The
performance of the proposed method is evaluated by MATLAB simulations to assess the
9. TELKOMNIKA ISSN: 1693-6930
A Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks (Felix Obite)
1135
influence of cooperation among CR nodes and system parameters such as SNR, decision
threshold and number of samples per CR node. The idea is to validate the numerical analysis
with simulation results. Simulation results show an improved detection performance with
increasing number of samples per CR node and increased number of CR users. A closer
observation of the result shows that the probability of detection increases with increased SNR
and an increased detection performance for a given reduced false alarm probability. The result
also reveals that for a higher maximum threshold, the smaller the value of d faP and P .
Similarly, the smaller the minimum threshold, the higher the value of d faP and P . By
implementing energy detector-based distributed sequential cooperative sensing, over
Nakagami-m fading, the hidden node problem in identifying the primary user will be greatly
reduced. More robust models and channel conditions can be investigated for future works.
References
[1] J Lunden, V Koivunen, HV Poor. Spectrum exploration and exploitation for cognitive radio: Recent
advances. IEEE Signal Processing Magazine. 2015; 32: 123-140.
[2] AK Mishra, DL Johnson. White Space Communication: Advances, Developments and Engineering
Challenges. Springer. 2014.
[3] IF Akyildiz, WY Lee, MC Vuran, S Mohanty. NeXt generation/dynamic spectrum access/cognitive
radio wireless networks: a survey. Computer Networks. 2006; 50: 2127-2159.
[4] HV Kumar, M Giriprsad. A Novel Approach to Optimize Cognitive Radio Network Utilization using
Cascading Technique. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2015; 13: 1233-
1241.
[5] R Umar, AU Sheikh. Spectrum access and sharing for cognitive radio. Developments in wireless
network prototyping, design and deployment: Future generations. 2012: 241-271.
[6] R Umar, AU Sheikh. A comparative study of spectrum awareness techniques for cognitive radio
oriented wireless networks. Physical Communication. 2013; 9: 148-170.
[7] AA Tabassam, MU Suleman, S Kalsait, S Khan. Building cognitive radios in MATLAB Simulink—A
step towards future wireless technology. In Wireless Advanced (WiAd). 2011: 15-20.
[8] FF Digham, MS Alouini, MK Simon. On the energy detection of unknown signals over fading
channels. IEEE Transactions on Communications. 2007; 55: 21-24.
[9] N Yadav, S Rathi. A comprehensive study of spectrum sensing techniques in cognitive radio.
International Journal of Advances in Engineering & Technology. 2011: 2231-1963.
[10] A Fanan, N Riley, M Mehdawi, M Ammar, M Zolfaghari. Survey: A Comparison of Spectrum Sensing
Techniques in Cognitive Radio.
[11] T Yucek, H Arslan. A survey of spectrum sensing algorithms for cognitive radio applications.
Communications Surveys & Tutorials, IEEE. 2009; 11: 116-130.
[12] S Ziafat, W Ejaz, H Jamal. Spectrum sensing techniques for cognitive radio networks: Performance
analysis. In Intelligent Radio for Future Personal Terminals (IMWS-IRFPT), 2011 IEEE MTT-S
International Microwave Workshop Series on. 2011: 1-4.
[13] K Aulakh. Spectrum Sensing for Wireless Communication Networks. IEEE. 2009.
[14] K Letaief, W Zhang. Cooperative communications for cognitive radio networks. Proceedings of the
IEEE. 2009; 97: 878-893.
[15] R Viswanathan, PK Varshney. Distributed detection with multiple sensors I. Fundamentals.
Proceedings of the IEEE. 1997; 85: 54-63.
[16] S Kandeepan, A Giorgetti, M Chiani, Distributed'ring-around'sequential spectrum sensing for
cognitive radio networks. In Communications (ICC), 2011 IEEE International Conference on. 2011: 1-
6.
[17] R Viswanathan, S Thomopoulos, R Tumuluri. Optimal serial distributed decision fusion. Aerospace
and Electronic Systems, IEEE Transactions on. 1998; 24: 366-376.
[18] JD Papastavrou, M Athans. On optimal distributed decision architectures in a hypothesis testing
environment. Automatic Control, IEEE Transactions on. 1992; 37: 1154-1169.
[19] W Huang, X. Xie, Y. Zhang, and S. Zhang, "Research on Sensor Network Spectrum Detection
Technology based on Cognitive Radio Network," TELKOMNIKA (Telecommunication Computing
Electronics and Control), vol. 14, pp. 101-109, 2016.
[20] K Koufos, K Ruttik, R Jäntti. Distributed sensing in multiband cognitive networks. Wireless
Communications, IEEE Transactions on. 2011; 10: 1667-1677.
[21] S Kar, R Tandon, HV Poor, S Cui. Distributed detection in noisy sensor networks. In Information
Theory Proceedings (ISIT), 2011 IEEE International Symposium on. 2011: 2856-2860.
10. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 3, September 2017 : 1127 – 1136
1136
[22] Y Chen, Q. Zhao, and A. Swami, "Distributed spectrum sensing and access in cognitive radio
networks with energy constraint," Signal Processing, IEEE Transactions on, vol. 57, pp. 783-797,
2009.
[23] R Chen, JM Park, YT Hou, JH Reed. Toward secure distributed spectrum sensing in cognitive radio
networks. Communications Magazine, IEEE. 2008; 46: 50-55.
[24] M Gandetto, C Regazzoni. Spectrum sensing: A distributed approach for cognitive terminals.
Selected Areas in Communications, IEEE Journal on. 2007; 25: 546-557.
[25] M Nakagami. The m-distribution-A general formula of intensity distribution of rapid fading. Statistical
Method of Radio Propagation. 1960.
[26] MK Simon, MS Alouini. Digital communication over fading channels. John Wiley & Sons. 2005.
[27] HA Suraweera, GK Karagiannidis. Closed-form error analysis of the non-identical Nakagami-m relay
fading channel. IEEE Communications Letters. 2008; 12: 259-261.
[28] C Zhong, T Ratnarajah, KK Wong. Outage analysis of decode-and-forward cognitive dual-hop
systems with the interference constraint in Nakagami-fading channels. IEEE Transactions on
Vehicular Technology. 2011; 60: 2875-2879.
[29] Y Deng, L Wang, M Elkashlan, KJ Kim, TQ Duong. Generalized Selection Combining for Cognitive
Relay Networks Over Nakagami-Fading. IEEE Transactions on Signal Processing. 2016; 63: 1993-
2006.
[30] K Sithamparanathan, A Giorgetti. Cognitive radio techniques: spectrum sensing, interference
mitigation, and localization. Artech house. 2012.
[31] SA Kassam. Signal detection in non-Gaussian noise. Springer Science & Business Media. 2012.
[32] HV Poor. An introduction to signal detection and estimation. Springer Science & Business Media.
2013.
[33] RR Tenney, NR Sandell. Detection with distributed sensors. IEEE Transactions on Aerospace and
Electronic systems. 1981: 501-510.
[34] D Bera, SS Pathak, I Chakrabarty, GK Karagiannidis. Another look in the Analysis of Cooperative
Spectrum Sensing over Nakagami Fading Channels. 2015.
[35] M Barkat. Signal detection and estimation. Artech house. 2005.
[36] S Atapattu, C Tellambura, H Jiang. Performance of an energy detector over channels with both
multipath fading and shadowing. IEEE Transactions on Wireless Communications. 2010; 9: 3662-
3670.
[37] TT Phu, TD Tran, M Voznak. Analysis of Probability of Non-zero Secrecy Capacity for Multi-hop
Networks in Presence of Hardware Impairments over Nakagami-m Fading Channels.
Radioengineering. 2016; 25.