With cloud computing, users can remotely store their data into the cloud and use on-demand high-quality applications. Data outsourcing: users are relieved from the burden of data storage and maintenance When users put their data (of large size) on the cloud, the data integrity protection is challenging enabling public audit for cloud data storage security is important Users can ask an external audit party to check the integrity of their outsourced data. Purpose of developing data security for data possession at un-trusted cloud storage servers we are often limited by the resources at the cloud server as well as at the client. Given that the data sizes are large and are stored at remote servers, accessing the entire file can be expensive in input output costs to the storage server. Also transmitting the file across the network to the client can consume heavy bandwidths. Since growth in storage capacity has far outpaced the growth in data access as well as network bandwidth, accessing and transmitting the entire archive even occasionally greatly limits the scalability of the network resources. Furthermore, the input output to establish the data proof interferes with the on-demand bandwidth of the server used for normal storage and retrieving purpose. The Third Party Auditor is a respective person to manage the remote data in a global manner.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
A cognitive radio and dynamic spectrum access – a studyijngnjournal
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the
demand of future services. While all of the radio spectrum is allocated to different services, applications
and users, observation show that usage of the spectrum is actually quite low. To overcome this problem
and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication,
in which a transmitter and receiver can detect intelligently communication channels that are in use and
those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes
possible the use of available radio frequency spectrum while minimizing interference with other users. CRs
must have the capability to learn and adapt their wireless transmission according to the surrounding radio
environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising
since they have a great importance for the implementation of Cognitive Radio networks architecture.
Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless
communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to
the actual licensees. This paper is a review and comparison of different DSA models and methods.
A Cognitive Radio And Dynamic Spectrum Access – A Studyjosephjonse
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the demand of future services. While all of the radio spectrum is allocated to different services, applications and users, observation show that usage of the spectrum is actually quite low. To overcome this problem and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication, in which a transmitter and receiver can detect intelligently communication channels that are in use and those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes possible the use of available radio frequency spectrum while minimizing interference with other users. CRs must have the capability to learn and adapt their wireless transmission according to the surrounding radio environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising since they have a great importance for the implementation of Cognitive Radio networks architecture. Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to the actual licensees. This paper is a review and comparison of different DSA models and methods.
Dynamic Spectrum Allocation in Wireless sensor NetworksIJMER
Radio frequency spectrum is considered the most expensive and scarce resource among all wireless
network resources, and it is closely followed by the energy consumption, especially in low energy, battery powered
wireless sensor network devices. These days, there is a tremendous growth in the applications of wireless sensor
networks (WSNs) operating in unlicensed spectrum bands (ISM). Moreover, due to the rapid growth of wireless
devices that are designed to be operated in unlicensed spectrum bands, these spectrum bands have been overcrowded.
The problem with overcrowded spectrum or scarcity of spectrum can be solved by Dynamic Allocation of Spectrum.
In this paper we have presented the implementation and analysis of dynamic spectrum allocation in Wireless Sensors
Networks using the concept of Cognitive Radio Ad Hoc Network.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
A cognitive radio and dynamic spectrum access – a studyijngnjournal
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the
demand of future services. While all of the radio spectrum is allocated to different services, applications
and users, observation show that usage of the spectrum is actually quite low. To overcome this problem
and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication,
in which a transmitter and receiver can detect intelligently communication channels that are in use and
those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes
possible the use of available radio frequency spectrum while minimizing interference with other users. CRs
must have the capability to learn and adapt their wireless transmission according to the surrounding radio
environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising
since they have a great importance for the implementation of Cognitive Radio networks architecture.
Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless
communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to
the actual licensees. This paper is a review and comparison of different DSA models and methods.
A Cognitive Radio And Dynamic Spectrum Access – A Studyjosephjonse
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the demand of future services. While all of the radio spectrum is allocated to different services, applications and users, observation show that usage of the spectrum is actually quite low. To overcome this problem and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication, in which a transmitter and receiver can detect intelligently communication channels that are in use and those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes possible the use of available radio frequency spectrum while minimizing interference with other users. CRs must have the capability to learn and adapt their wireless transmission according to the surrounding radio environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising since they have a great importance for the implementation of Cognitive Radio networks architecture. Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to the actual licensees. This paper is a review and comparison of different DSA models and methods.
Dynamic Spectrum Allocation in Wireless sensor NetworksIJMER
Radio frequency spectrum is considered the most expensive and scarce resource among all wireless
network resources, and it is closely followed by the energy consumption, especially in low energy, battery powered
wireless sensor network devices. These days, there is a tremendous growth in the applications of wireless sensor
networks (WSNs) operating in unlicensed spectrum bands (ISM). Moreover, due to the rapid growth of wireless
devices that are designed to be operated in unlicensed spectrum bands, these spectrum bands have been overcrowded.
The problem with overcrowded spectrum or scarcity of spectrum can be solved by Dynamic Allocation of Spectrum.
In this paper we have presented the implementation and analysis of dynamic spectrum allocation in Wireless Sensors
Networks using the concept of Cognitive Radio Ad Hoc Network.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOijngnjournal
Cognitive radio (CR) is a new paradigm that utilizes the available spectrum band. The key characteristic of CR system is to sense the electromagnetic environment to adapt their operation and dynamically vary its radio operating parameters. The technique of dynamically accessing the unused spectrum band is known as Dynamic Spectrum Access (DSA). The dynamic spectrum access technology helps to minimize unused spectrum bands. In this paper, main functions of Cognitive Radio (CR) i.e. spectrum sensing, spectrum management, spectrum mobility and spectrum sharing are discussed. Then DSA models are discussed along with different methods of DSA such as Command and Control, Exclusive-Use, Shared Use of Primary Licensed User and Commons method. Game-theoretic approach using Bertrand game model, Markovian Queuing Model for spectrum allocation in centralized architecture and Fuzzy logic based method are also discussed and result are shown.
Introduction of cognitive radio and the advantage over the classical ad hoc network. Various challenges of Cognitive radio in spectrum sensing,spectrum decision,spectrum sharing and spectrum mobility.
Simulation and analysis of cognitive radioijngnjournal
The increasing demand of wireless applications has put a lot of limitations on the use of available
radio spectrum is limited and precious resource. Many survey of spectrum utilization shows that entire
spectrum is not used at all the times, so many of the radio spectrum is underutilized. Some of the frequency
bands in the spectrum are unoccupied, some of the frequency bands less occupied and few bands are over
utilized. Cognitive radio system is a technique which overcomes that spectrum underutilization. Cognitive
radio is a technique where secondary user looks for a free band to use when primary user is not in use of
its licensed band. A function of cognitive radio is called Spectrum sensing which enables to search for the
free bands and it helps to detect the spectrum hole (frequency band which is free enough to be used) which
can be utilized by secondary user with high spectral resolution capability. The idea of simulation and
analysis of Cognitive Radio System to reuse unused spectrum to increase the total system capacity was
brought in this paper and this work digs into the practical implementation of a Cognitive radio system.
MATLAB R2007b (version7.5) has been used to test the performance of Cognitive radio dynamically.
IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...cscpconf
We present in this work an energy detection algorithm, based on spectral power estimation, in
the context of cognitive radio. The algorithm is based on the Neyman-Pearson test where the
robustness of the appropriate spectral bands identification, is based, at one hand, on the
‘judicious’ choice of the probability of detection (PD) and false alarm probability (PF). First, we
accomplish a comparative study between two techniques for estimation of PSD (Power Spectral
Density): the periodogram and Welch methods. Also, the interest is focused on the choice of the
optimal duration of observation where we can state that this latter one should be inversely
proportional to the level of the SNR of the transmitted signal to be sensed. The developed
algorithm is applied in the context of cognitive radio. The algorithm aims to identify the free
spectral bands representing, reserved for the primary user, of the signal carrying information,
issued from an ASCII encoding alphanumeric message and utilizing the BPSK modulation,
transmitted through an AWGN (Added White Gaussian Noise) channel. The algorithm succeeds
in identifying the free spectral bands even for low SNR lev
Implementation of a bpsk modulation based cognitive radio system using the en...csandit
We present in this work an energy detection algorit
hm, based on spectral power estimation, in
the context of cognitive radio. The algorithm is ba
sed on the Neyman-Pearson test where the
robustness of the appropriate spectral bands identi
fication, is based, at one hand, on the
‘judicious’ choice of the probability of detection
(P
D
) and false alarm probability (P
F
). First, we
accomplish a comparative study between two techniqu
es for estimation of PSD (Power Spectral
Density): the periodogram and Welch methods. Also,
the interest is focused on the choice of the
optimal duration of observation where we can state
that this latter one should be inversely
proportional to the level of the SNR of the transmi
tted signal to be sensed. The developed
algorithm is applied in the context of cognitive ra
dio. The algorithm aims to identify the free
spectral bands representing, reserved for the prima
ry user, of the signal carrying information,
issued from an ASCII encoding alphanumeric message
and utilizing the BPSK modulation,
transmitted through an AWGN (Added White Gaussian N
oise) channel. The algorithm succeeds
in identifying the free spectral bands even for low
SNR levels (e.g. to -2 dB) and allocate them
to the informative signal representing the secondar
y user.
An Approach to Spectrum Sensing in Cognitive Radio IOSR Journals
Recent research shows that more than 70% of the available spectrum is not utilized
efficiently. The bandwidth becomes expensive due to a shortage of frequencies. Therefore for efficient
utilization of spectrum, we need to sniff the spectrum to determine whether it is being used by primary user or
not. The term cognitive radio refers to the adoption of radio parameters using the sensed information
of the spectrum. There are various spectrum sensing techniques proposed in the literature but still there is
room for researchers in this field to explore more sophisticated approaches. There are three major
categories of spectrum sensing techniques; transmitter detection, receiver detection and interference
temperature detection. This thesis presents a survey of techniques suggested in the literature for
spectrum sensing with a performance analysis of transmitter-based detection techniques.
An Investigation into Brain Tumor Segmentation Techniques IIRindia
A tumor is an anomalous mass in the brain which can be cancerous. Such anomalous growth within this restricted space or inside the covering skull can cause problems. Detecting brain tumors from images of medical modalities like CT scan or MRI involves segmentation (Division into parts) for analysis and can be a challenging task. Accurate segmentation of brain images is very essential for proper diagnosis of tumor and non-tumor areas for clinical analysis. This paper details on segmentation algorithms for brain images, advantages, disadvantages and a comparison of the algorithms.
Agricultural sector is the backbone of our country and it plays a vital role in the overall economic growth of our nation. India has about 59% of its total area for agricultural purpose. The contribution of agricultural sector to our GDP is about 17%. Advanced techniques or the betterment in the arena of agriculture will as certain to increase the competence of certain farming activities. In this paper we introduce a concept for smart farming which utilizes wireless sensor web technology with a web based application. This will play a crucial role in helping farmers. It will aim for the betterment in the facilities given to the farmers and by focussing on the measurement of production of the crops. With the help of data mining techniques and algorithms like K-nearest, decision tree we will gather each and every data related to the farming and it should be updated frequently so that farmers and the consumers will get the right knowledge of the respective crops and about the suitable equipments related to farming. Existing system are not so much efficient in displaying such data characteristics. Our main aim is to enhance the growth in the agriculture sector and make the existing system smarter so that the decision- maker can define the expansion of agriculture activities to empower the different forces in existing agriculture sector
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOijngnjournal
Cognitive radio (CR) is a new paradigm that utilizes the available spectrum band. The key characteristic of CR system is to sense the electromagnetic environment to adapt their operation and dynamically vary its radio operating parameters. The technique of dynamically accessing the unused spectrum band is known as Dynamic Spectrum Access (DSA). The dynamic spectrum access technology helps to minimize unused spectrum bands. In this paper, main functions of Cognitive Radio (CR) i.e. spectrum sensing, spectrum management, spectrum mobility and spectrum sharing are discussed. Then DSA models are discussed along with different methods of DSA such as Command and Control, Exclusive-Use, Shared Use of Primary Licensed User and Commons method. Game-theoretic approach using Bertrand game model, Markovian Queuing Model for spectrum allocation in centralized architecture and Fuzzy logic based method are also discussed and result are shown.
Introduction of cognitive radio and the advantage over the classical ad hoc network. Various challenges of Cognitive radio in spectrum sensing,spectrum decision,spectrum sharing and spectrum mobility.
Simulation and analysis of cognitive radioijngnjournal
The increasing demand of wireless applications has put a lot of limitations on the use of available
radio spectrum is limited and precious resource. Many survey of spectrum utilization shows that entire
spectrum is not used at all the times, so many of the radio spectrum is underutilized. Some of the frequency
bands in the spectrum are unoccupied, some of the frequency bands less occupied and few bands are over
utilized. Cognitive radio system is a technique which overcomes that spectrum underutilization. Cognitive
radio is a technique where secondary user looks for a free band to use when primary user is not in use of
its licensed band. A function of cognitive radio is called Spectrum sensing which enables to search for the
free bands and it helps to detect the spectrum hole (frequency band which is free enough to be used) which
can be utilized by secondary user with high spectral resolution capability. The idea of simulation and
analysis of Cognitive Radio System to reuse unused spectrum to increase the total system capacity was
brought in this paper and this work digs into the practical implementation of a Cognitive radio system.
MATLAB R2007b (version7.5) has been used to test the performance of Cognitive radio dynamically.
IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...cscpconf
We present in this work an energy detection algorithm, based on spectral power estimation, in
the context of cognitive radio. The algorithm is based on the Neyman-Pearson test where the
robustness of the appropriate spectral bands identification, is based, at one hand, on the
‘judicious’ choice of the probability of detection (PD) and false alarm probability (PF). First, we
accomplish a comparative study between two techniques for estimation of PSD (Power Spectral
Density): the periodogram and Welch methods. Also, the interest is focused on the choice of the
optimal duration of observation where we can state that this latter one should be inversely
proportional to the level of the SNR of the transmitted signal to be sensed. The developed
algorithm is applied in the context of cognitive radio. The algorithm aims to identify the free
spectral bands representing, reserved for the primary user, of the signal carrying information,
issued from an ASCII encoding alphanumeric message and utilizing the BPSK modulation,
transmitted through an AWGN (Added White Gaussian Noise) channel. The algorithm succeeds
in identifying the free spectral bands even for low SNR lev
Implementation of a bpsk modulation based cognitive radio system using the en...csandit
We present in this work an energy detection algorit
hm, based on spectral power estimation, in
the context of cognitive radio. The algorithm is ba
sed on the Neyman-Pearson test where the
robustness of the appropriate spectral bands identi
fication, is based, at one hand, on the
‘judicious’ choice of the probability of detection
(P
D
) and false alarm probability (P
F
). First, we
accomplish a comparative study between two techniqu
es for estimation of PSD (Power Spectral
Density): the periodogram and Welch methods. Also,
the interest is focused on the choice of the
optimal duration of observation where we can state
that this latter one should be inversely
proportional to the level of the SNR of the transmi
tted signal to be sensed. The developed
algorithm is applied in the context of cognitive ra
dio. The algorithm aims to identify the free
spectral bands representing, reserved for the prima
ry user, of the signal carrying information,
issued from an ASCII encoding alphanumeric message
and utilizing the BPSK modulation,
transmitted through an AWGN (Added White Gaussian N
oise) channel. The algorithm succeeds
in identifying the free spectral bands even for low
SNR levels (e.g. to -2 dB) and allocate them
to the informative signal representing the secondar
y user.
An Approach to Spectrum Sensing in Cognitive Radio IOSR Journals
Recent research shows that more than 70% of the available spectrum is not utilized
efficiently. The bandwidth becomes expensive due to a shortage of frequencies. Therefore for efficient
utilization of spectrum, we need to sniff the spectrum to determine whether it is being used by primary user or
not. The term cognitive radio refers to the adoption of radio parameters using the sensed information
of the spectrum. There are various spectrum sensing techniques proposed in the literature but still there is
room for researchers in this field to explore more sophisticated approaches. There are three major
categories of spectrum sensing techniques; transmitter detection, receiver detection and interference
temperature detection. This thesis presents a survey of techniques suggested in the literature for
spectrum sensing with a performance analysis of transmitter-based detection techniques.
An Investigation into Brain Tumor Segmentation Techniques IIRindia
A tumor is an anomalous mass in the brain which can be cancerous. Such anomalous growth within this restricted space or inside the covering skull can cause problems. Detecting brain tumors from images of medical modalities like CT scan or MRI involves segmentation (Division into parts) for analysis and can be a challenging task. Accurate segmentation of brain images is very essential for proper diagnosis of tumor and non-tumor areas for clinical analysis. This paper details on segmentation algorithms for brain images, advantages, disadvantages and a comparison of the algorithms.
Agricultural sector is the backbone of our country and it plays a vital role in the overall economic growth of our nation. India has about 59% of its total area for agricultural purpose. The contribution of agricultural sector to our GDP is about 17%. Advanced techniques or the betterment in the arena of agriculture will as certain to increase the competence of certain farming activities. In this paper we introduce a concept for smart farming which utilizes wireless sensor web technology with a web based application. This will play a crucial role in helping farmers. It will aim for the betterment in the facilities given to the farmers and by focussing on the measurement of production of the crops. With the help of data mining techniques and algorithms like K-nearest, decision tree we will gather each and every data related to the farming and it should be updated frequently so that farmers and the consumers will get the right knowledge of the respective crops and about the suitable equipments related to farming. Existing system are not so much efficient in displaying such data characteristics. Our main aim is to enhance the growth in the agriculture sector and make the existing system smarter so that the decision- maker can define the expansion of agriculture activities to empower the different forces in existing agriculture sector
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...IIRindia
Data Mining (DM) is a powerful and a new field having various techniques to analyses the recent real world problems. In DM, environmental mining is one of the essential and interesting research areas. DM enables to collect fundamental insights and knowledge from massive volume of environmental data. The water quality is determining the condition of water in the environment. It represents the concentration and state (dissolved or particulate) of some or all the organic and inorganic material present in the water, together with certain physical characteristics of the water. The Dissolved Oxygen (DO) is one of the important aspects of water quality. The DO is the quantity of gaseous oxygen (O2) incorporated into the water. The DO is essential for keeping the water organisms alive. The amount of DO level in the water can be detected by various methods. The data mining techniques are properly used to find DO Level in the different types of water. A number of DM methods used to analyze the DO level such as Multi-Layer Perceptron, Multivariate Linear Regression, Factor Analysis, and Feed Forward Neural Network. This survey work discusses about such type of methods, particularly used for the analysis of DO level elaborately.
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...IIRindia
In order to analyse the chosen data from various points of view, data mining is used as the effective process. This process is also used to sum-up all those views into useful information. There are several types of algorithms in data mining such as Classification algorithms, Regression, Segmentation algorithms, association algorithms, sequence analysis algorithms, etc.,. The classification algorithm can be used to bifurcate the data set from the given data set and foretell one or more discrete variables, based on the other attributes in the dataset. The ID3 (Iterative Dichotomiser 3) algorithm is an original data set S as the root node. An unutilised attribute of the data set S calculates the entropy H(S) (or Information gain IG (A)) of the attribute. Upon its selection, the attribute should have the smallest entropy (or largest information gain) value. The prime objective of this paper is to analyze the data from a Kidney disorder due to diabetics by using classification technique to predict class accurately.
Silhouette Threshold Based Text Clustering for Log AnalysisIIRindia
Automated log analysis has been a dominant subject area of interest to both industry and academics alike. The heterogeneous nature of system logs, the disparate sources of logs (Infrastructure, Networks, Databases and Applications) and their underlying structure & formats makes the challenge harder. In this paper I present the less frequently used document clustering techniques to dynamically organize real time log events (e.g. Errors, warnings) to specific categories that are pre-built from a corpus of log archives. This kind of syntactic log categorization can be exploited for automatic log monitoring, priority flagging and dynamic solution recommendation systems. I propose practical strategies to cluster and correlate high volume log archives and high velocity real time log events; both in terms of solution quality and computational efficiency. First I compare two traditional partitional document clustering approaches to categorize high dimensional log corpus. In order to select a suitable model for our problem, Entropy, Purity and Silhouette Index are used to evaluate these different learning approaches. Then I propose computationally efficient approaches to generate vector space model for the real time log events. Then to dynamically relate them to the categories from the corpus, I suggest the use of a combination of critical distance measure and least distance approach. In addition, I introduce and evaluate three different critical distance measures to ascertain if the real time event belongs to a totally new category that is unobserved in the corpus.
Analysis and Representation of Igbo Text Document for a Text-Based SystemIIRindia
The advancement in Information Technology (IT) has assisted in inculcating the three Nigeria major languages in text-based application such as text mining, information retrieval and natural language processing. The interest of this paper is the Igbo language, which uses compounding as a common type of word formation and as well has many vocabularies of compound words. The issues of collocation, word ordering and compounding play high role in Igbo language. The ambiguity in dealing with these compound words has made the representation of Igbo language text document very difficult because this cannot be addressed using the most common and standard approach of the Bag-Of-Words (BOW) model of text representation, which ignores the word order and relation. However, this cause for a concern and the need to develop an improved model to capture this situation. This paper presents the analysis of Igbo language text document, considering its compounding nature and describes its representation with the Word-based N-gram model to properly prepare it for any text-based application. The result shows that Bigram and Trigram n-gram text representation models provide more semantic information as well addresses the issues of compounding, word ordering and collocations which are the major language peculiarities in Igbo. They are likely to give better performance when used in any Igbo text-based system.
A Survey on E-Learning System with Data MiningIIRindia
E-learning process has been widely used in university campus and educational institutions are playing vital role to enhance the skill set of students. Modern E-learning done by many electronic devices, such as smartphones, Tabs, and so on, on existing E-learning tools is insufficient to achieve the purpose of online training of education. This paper presents a survey of online e-Learning authoring tools for creating and integrating reusable e-learning tool for generation and enhancing existing learning resources with them. The work concentrates on evaluation of the existing e-learning tools a, and authoring tools that have shown good performance in the past for online learners. This survey work takes more than 20 online tools that deal with the educational sector mechanism, for the purpose of observations, and the outcome were analyzed. The findings of this paper are the main reason for developing a new tool, and it shows that educators can enhance existing learning resources by adding assessment resources, if suitable authoring tools are provided. Finally, the different factors that assure the reusability of the created new e-learning tool has been analysed in this paper.E-learning environment is a guide for both students and tutorial management system. The useful on the e-learning system for apart from students and distance learning students. The purpose of using e-learning environment for online education system, developed in data mining for more number of clustering servers and resource chain has been good.
Image Segmentation Based Survey on the Lung Cancer MRI ImagesIIRindia
Educational data mining (EDM) creates high impact in the field of academic domain. The methods used in this topic are playing a major advanced key role in increasing knowledge among students. EDM explores and gives ideas in understanding behavioral patterns of students to choose a correct path for choosing their carrier. This survey focuses on such category and it discusses on various techniques involved in making educational data mining for their knowledge improvement. Also, it discusses about different types of EDM tools and techniques in this article. Among the different tools and techniques, best categories are suggested for real world usage.
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...IIRindia
Resting anterior brain electrical activity, self-report measures of Behavioral Approach System (BAS) and Behavioral Inhibition System (BIS) strength, and common levels of Positive Affect (PA) and Negative Affect (NA) were composed from 46 unselected undergraduates two split occasions Electroencephalogram (EEG) measures of prefrontal asymmetry and the self-report measures showed excellent internal reliability, steadiness and tolerable test-retest stability. Strong connection betweens the unconstrained facial emotional expressions and the full of feeling states correlated cerebrum movement. When seeing dreadful as contrasted with unbiased faces, members showed larger amounts of actuation inside the privilege average prefrontal cortex (PFC). To propose a multimodal method to deal with assess Efficient Practical near Infrared Spectroscopy (EPNIS) signals and EEG signals for full of feeling state identification. Outcomes demonstrate that proposed technique with EPNIS enhances execution over EPNIS methodologies. Based on
Feature Based Underwater Fish Recognition Using SVM ClassifierIIRindia
An approach for underwater fish recognition based on wavelet transform is presented in this paper. This approach decomposes the input image into sub-bands by using the multi resolutional analysis known as Discrete Wavelet Transform (DWT). As each sub-band in the decomposed image contains useful information about the image, the mean values of every sub-band are assumed as features. This approach is tested on Underwater Photography - A Fish Database. The database contains 7953 pictures of 1458 different species. The database is considered for the classification based on Support Vector machine (SVM) classifier. The result shows that maximum recognition accuracy of 90.74% is achieved by the wavelet features.
A Survey on Educational Data Mining TechniquesIIRindia
Educational data mining (EDM) creates high impact in the field of academic domain. The methods used in this topic are playing a major advanced key role in increasing knowledge among students. EDM explores and gives ideas in understanding behavioral patterns of students to choose a correct path for choosing their carrier. This survey focuses on such category and it discusses on various techniques involved in making educational data mining for their knowledge improvement. Also, it discusses about different types of EDM tools and techniques in this article. Among the different tools and techniques, best categories are suggested for real world usage.
The objective of this research work is focused on the right cluster creation of lung cancer data and analyzed the efficiency of k-Means and k-Medoids algorithms. This research work would help the developers to identify the characteristics and flow of algorithms. In this research work is pertinent for the department of oncology in cancer centers. This implementation helps the oncologist to make decision with lesser execution time of the algorithm.It is also enhances the medical care applications. This work is very suitable for selection of cluster development algorithm for lung cancer data analysis.Clustering is an important technique in data mining which is applied in many fields including medical diagnosis to find diseases. It is the process of grouping data, where grouping is recognized by discovering similarities between data based on their features. In this research work, the lung cancer data is used to find the performance of clustering algorithms via its computational time. Considering a limited number attributes of lung cancer data, the algorithmic steps are applied to get results and compare the performance of algorithms. The partition based clustering algorithms k-Means and k-Mediods are selected to analyze the lung cancer data.The efficiency of both the algorithms is analyzed based on the results produced by this approach. The finest outcome of the performance of the algorithm is reported for the chosen data concept.
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...IIRindia
A comparison study between automatic and interactive methods for liver segmentation from contrast-enhanced MRI images is ocean. A collection of 20 clinical images with reference segmentations was provided to train and tune algorithms in advance. Employed algorithms include statistical shape models, atlas registration, level-sets, graph-cuts and rule-based systems. All results were compared to refer five error measures that highlight different aspects of segmentation accuracy. The measures were combined according to a specific scoring system relating the obtained values to human expert variability. In general, interactive methods like Fuzzy Connected and Watershed Methods reached higher average scores than automatic approaches and featured a better consistency of segmentation quality. However, the best automatic methods (mainly based on statistical shape models with some additional free deformation) could compete well on the majority of test images. The study provides an insight in performance of different segmentation approaches under real-world conditions and highlights achievements and limitations of current image analysis techniques. In this paper only Fuzzy Connected and Watershed Methods are discussed.
A Clustering Based Collaborative and Pattern based Filtering approach for Big...IIRindia
With web services developing and aggregating in application range, benefit revelation has turned into a hot issue for benefit organization and service management. Service clustering gives a promising approach to part the entire seeking space into little areas in order to limit the disclosure time successfully. In any case, semantic data is a basic component amid the entire arranging process. Current industrialized Web Service Portrayal Language (WSPL) does not contain enough data for benefit depiction. Thusly, a service clustering technique has been proposed, which upgrades unique WSPL report with semantic data by methods for Connected Open Information (COI). Examination based genuine service information has been performed, and correlation with comparable techniques has additionally been given to exhibit the adequacy of the strategy. It is demonstrated that using semantic data from COI improves the exactness of service grouping. Furthermore, it shapes a sound base for promote thorough preparing with semantic data.
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...IIRindia
Numerous movable applications on secure groceries expenditure and e-health have designed recently. Health aware clients respect such applications for secure groceries expenditure, particularly to avoid irritating groceries and added substances. However, there is the lack of a complete database including organized or unstructured information to help such applications. In the paper propose the Multiple Scoring Frameworks (MSF), a healthy groceries expenditure search service for movable applications using Hadoop and MapReduce (MR). The MSF works in a procedure behind a portable application to give a search service for data on groceries and groceries added substances. MSF works with similar logic from a web search engine (WSE) and it crawls over Web sources cataloguing important data for possible utilize in reacting to questions from movable applications. MSF outline and advancement are featured in the paper during its framework design, inquiry understanding, its utilization of the Hadoop/MapReduce infrastructure, and activity contents.
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...IIRindia
Educational Data mining(EDM)is a prominent field concerned with developing methods for exploring the unique and increasingly large scale data that come from educational settings and using those methods to better understand students in which they learn. It has been proved in various studies and by the previous study by the authors that data mining techniques find widespread applications in the educational decision making process for improving the performance of students in higher educational institutions. Classification techniques assumes significant importance in the machine learning tasks and are mostly employed in the prediction related problems. In machine learning problems, feature selection techniques are used to reduce the attributes of the class variables by removing the redundant and irrelevant features from the dataset. The aim of this research work is to compares the performance of various feature selection techniques is done using WEKA tool in the prediction of students’ performance in the final semester examination using different classification algorithms. Particularly J48, Naïve Bayes, Bayes Net, IBk, OneR, and JRip are used in this research work. The dataset for the study were collected from the student’s performance report of a private college in Tamil Nadu state of India. The effectiveness of various feature selection algorithms was compared with six classifiers and the results are discussed. The results of this study shows that the accuracy of IBK is 99.680% which is found to be
A Review of Edge Detection Techniques for Image SegmentationIIRindia
Edge detection is a key stride in Image investigation. Edges characterize the limits between areas in a image, which assists with division and article acknowledgment.Edge discovery is a image preparing method for finding the limits of articles inside Image. It works by distinguishing irregular in brilliance and utilized for Image division and information extraction in zones, for example, Image preparing, PC vision and Image vision. There are likely more algorithms in a writing of upgrading and distinguishing edges than whatever other single subject.In this paper, the principle is to concentrate most usually utilized edge methods for Image segmentation.
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...IIRindia
Lean principles are being implemented by many industries today that focus on improving the efficiency of the operations for reducing the waste, efforts and consumption. Organizations implementing lean principles can be assessed using the some tools. This paper attempts to assess the lean implementation in a leading Horn manufacturing industry in South India. The twofold objectives are set to be achieved through this paper. First is to find the leanness level of a manufacturing organization for which a horn manufacturing company has been selected as the case company. Second is to find the critical obstacles for the lean implementation. The fuzzy logic computation method is used to extract the perceptions about the particular variables by using linguistic values and then match it with fuzzy numbers to compute the precise value of the leanness level of the organization. Based on the results obtained from this analysis, it was found that the case study company has performed in the lean to vey lean range and the weaker areas have been identified to improve the performance further.
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...IIRindia
Health care has millions of centric data to discover the essential data is more important. In data mining the discovery of hidden information can be more innovative and useful for much necessity constraint in the field of forecasting, patient’s behavior, executive information system, e-governance the data mining tools and technique play a vital role. In Parkinson health care domain the hidden concept predicts the possibility of likelihood of the disease and also ensures the important feature attribute. The explicit patterns are converted to implicit by applying various algorithms i.e., association, clustering, classification to arrive at the full potential of the medical data. In this research work Parkinson dataset have been used with different classifiers to estimate the accuracy, sensitivity, specificity, kappa and roc characteristics. The proposed weighted empirical optimization algorithm is compared with other classifiers to be efficient in terms of accuracy and other related measures. The proposed model exhibited utmost accuracy of 87.17% with a robust kappa statistics measurement and roc degree indicated the strong stability of the model when compared to other classifiers. The total penalty cost generated by the proposed model is less when compared with the penalty cost of other classifiers in addition to accuracy and other performance measures.
Survey on Segmentation Techniques for Spinal Cord ImagesIIRindia
Medical imaging is a technique which is used to expose the interior part of the body, to diagnose the diseases and to treat them as well. Different modalities are used to process the medical images. It helps the human specialists to make diagnosis ailments. In this paper, we surveyed segmentation on the spinal cord images using different techniques such as Data mining, Support vector machine, Neural Networks and Genetic Algorithm which are applied to find the disorders and syndromes affected in the spinal cord system. As a result, we have gained knowledge in an identified disarrays and ailments affected in lumbar vertebra, thoracolumbar vertebra and spinal canal. Finally how the Disc Similarity Index values are generated in each method is also analysed.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
1. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume 5, Issue 1, June 2016, Page No.79-82
ISSN: 2278-2419
79
Spectrum Management Techniques using
Cognitive Radios Cognitive Radio Technology
U. Steve Arul, S. Salai Chandira Rajan
III ECE, Saranathan College of Engineering, Panjappur , Trichy, Tamilnadu, India
stevearul96@gmail.com, salaichandirarajans@gmail.com
Abstract - Spectrum has been a very valuable resource in
wireless communication systems. The available
electromagnetic radio spectrum is getting crowded day by day
due to manipulation in wireless devices and applications.
Underutilization of Spectrum has become a major source of
concern for each network user. The present paper attempts to
portray “Spectrum Management Techniques using Cognitive
Radios”, where the strength and scope of Cognitive Radio
Technology are discussed. It also highlights the efficiency and
effectiveness of the system when compared to conventional
mode of operations. Further, the present paper also lucidly
explains the modus operandus of Cognitive Radio Technology
Spectrum Management Techniques namely Spectrum Sensing,
Spectrum Decision-Making, Spectrum Sharing and Spectrum
Mobility. These functionalities make Cognitive Radio
Technology an asset to the network domain and easily solves
issues like interference, noise and underutilization. The paper
also focusses on describing the Transreceiver and network
architecture. On the whole, this paper is an overall description
about the Spectrum Management Techniques in Cognitive
Radio Technology in brief.
I. INTRODUCTION
The growing demand of wireless applications has put a lot of
constraints in the usage of available radio spectrum .which is
limited and precious resource. Also, it has been found that the
allocated spectrum is underutilized due to spectrum static
allocation. Moreover the conventional approach to manage
spectrum is very inflexible. Present wireless networks are
characterized by such a policy, where governmental agencies
assign this spectrum on a long term basics to license holders.
With most of these sort of allocations it is hard to find vacant
bands to either deploy new services or to enhance existing
ones. In order to overcome this situation, a new means for
improved utilization of the spectrum creating opportunities for
dynamic spectrum access is preferred. This issue can be solved
using Cognitive Radio (CR) technology.
II. COGNITIVE RADIO TECHNOLOGY
Cognitive Radios are designed such as through provide highly
reliable communication to all users of the network, wherever
and whenever needed and to facilitate effective Radio spectrum
utilization. Cognitive Radio can change it’s transmitter
parameters based on it’s interaction with the environment. CR
Networks are envisioned to provide higher bandwidth to
mobile users the key enabling technologies of CR Networks
are the Cognitive Radio techniques that provide the capability
to share the spectrum in an opportunistic manner.
CR enables the wide usage of temporally unused spectrum,
referred to as spectrum hold or white space. Consequently, it
selects the best spectrum which is shared with other users and
exploited without interference from the licensed user. CR as
the functionality to be programmed to transmit and receive on
a wide variety of frequencies. Through this capability, the best
spectrum band the most suitable operating parameters can be
selected and can reconfigured.
Figure 1: White space or Spectrum hole
III. ARCHITECTURE:
Figure 2: CR Transreceiver Architecture
CR requires a novel Radio Frequency (RF) Transreceiver
architecture. The main components of CR Transreceiver or the
Radio front-end and the Base-band processing unit. The novel
characteristic of the CR Transreceiver is the wideband RF
front-end that is capable of simultaneous sensing over a wide
frequency range. Here, the received signal is amplified, mixed
and analog to digital converter. In the base-band processing
unit the signal is either modulated or demodulated.
A comprehensive description of CR Network architecture is
essential for developing communication protocols that address
the dynamic spectrum variation. The components of the CR
Network architecture can be classified as two group’s namely
primary network and CR Network the primary network (or
licensed network) is refer to as an existing network. Here, the
2. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 04 Issue: 01, June 2015 Page No.79-82
ISSN: 2278-2419
80
primary users pertain a license to operate in a specific spectrum
band. If primary networks possess an infrastructure, their
activities or controlled through primary base stations. The CR
Network (dynamic spectrum access network/secondary
network/unlicensed network) does not have a license to operate
in a desire band. Thus, additional functionality is required
these users to share the licensed spectrum band. CR Networks
may include spectrum brokers that distribute spectrum
resources among secondary networks.
Figure 3: CR Network Architecture
IV. ADVANTAGES OVER TRADITIONAL
NETWORKS
Overcome radio spectrum scarcity
By sensing spectrum utilization (irrespective of channel
allocation), cognitive radios can broadcast on unused radio
spectrum, while still avoiding interference with the operation
of the primary licensee.
Avoid intentional radio jamming scenarios
By sensing channel availability and even predicting the
jammer’s tactics , cognitive radios can evade jamming by
dynamically and preemptively switching to higher quality
channels.
Switch to power saving protocol
By switching to protocols that trade off lower power
consumption for lower bandwidth, cognitive radios conserve
power when slower data rates suffice.
Improve satellite communications
By predicting rain fade and reconfiguring
transmitters/receivers for optimum bandwidth, cognitive radios
improve communication quality when and where the
information is needed most.
Improves quality of service
By sensing environmental and inadvertent man-made radio
interferences, cognitive radios can select frequency channels
with a higher Signal to Noise Ratio (SNR).
V. SPECTRUM MANAGEMENT
Figure 4: Process of Spectrum Management
The Spectrum Management Process consists of four major
steps. They are
Spectrum Sensing
Spectrum Decision-Making
Spectrum Sharing
Spectrum Mobility
Spectrum Sensing: A CR User can allocate only an unused
portion of the spectrum. Therefore, a CR User should monitor
the available spectrum bands, capture their information, and
then detect spectrum holes.
Spectrum Decision-Making: Based on the spectrum
availability, CR Users can allocate a channel. This allocation
not only depends upon Spectrum availability, but also based on
internal policies.
Spectrum Sharing: Because there maybe multiple CR Users
trying to access the spectrum, CR Network should be
coordinated to prevent collision of multiple users.
Spectrum Mobility: CR Users are regarded as visitors to the
Spectrum. Hence, if the specific portion of the spectrum is a
primary network, communication must be continued in another
vacant portion of the Spectrum.
VI. SPECTRUM SENSING
We can categorize Spectrum Sensing technique into:
Frequency Domain Approach, Time Domain Approach
Frequency Domain Approach: In this approach, the estimation
is carries out directly from the signal. It is also known as Direct
Spectrum Sensing technique.
Time Domain Approach: The estimation is performed using
auto-correlation the signal. It is also known as Indirect
Spectrum Sensing technique. Another way of classification is
done as follows:
Non-Cooperative System: It is based on detection of the weak
signal from a primary transmitter through the local observation
of CR Users. Three schemes are generally used for transmitter
3. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 04 Issue: 01, June 2015 Page No.79-82
ISSN: 2278-2419
81
detection. Matched filter detection, Energy detection,
Cyclostationary feature detection
Matched filter detection: Matched filter is a linear filter
designed to maximize the output signal to noise ratio for the
given input signal. Matched filter operation is equivalent to
correlation in which the unknown signal is convolved with the
filter whose impulse response is the mirror and time shifted
version of reference signal. The operation of Matched filter
detection is expressed as Where x is the unknown signal
(vector) and h is the impulse response of the matched filter.
Energy detection: It is a non-coherent detection method that
detect the primary signal based on the sensed energy. Due to
it’s simplicity and no requirement, it is the most popular
sensing technique is con-cooperative sensing.
Cyclostationary feature detection: Cyclostationary feature
detection is robust to noise uncertainties and performs better
than energy detection in low signal to noise ratio regions.
Although it requires a prior knowledge of the signal
characteristics, cyclostationary feature detection is capable of
distinguishing the CR Transmissions from various types of
primary user signals.
Figure 5: Spectrum Sensing Techniques
Cooperative System: Although Cooperative System reduces
the probability of interference, the most efficient way to detect
spectrum holes is to detect the primary users who are receiving
data within the communication range of CR Users. Currently,
this method is only feasible in the detection of TV Receivers
and various topologies are currently used and are broadly
classified into three regions according to their level of
cooperation. Decentralized uncoordinated technique,
Centralized coordinated technique, Decentralized coordinated
technique
Decentralized uncoordinated technique: The Cognitive Users
in the network do not have any kind of cooperation, which
means that each CR user will independently detect the
channels.
Centralized coordinated technique: In this technique, it
cooperated only in sensing the channel. CR Users
independently detect the channel and inform the CR
Controller, which then notifies all CR Users.
Decentralized coordinated technique: This type of
coordination implies building up a network of Cognitive
Radios without having the need of a controller.
Interference Based Detection: Primary Receiver emits the local
oscillator and leakage power from it’s RF front-end while
receiving the data from Primary Transmitter. Within the
communication range of CR system users, the local sensor then
reports the sensed information to the CR Users so that they can
identify the Spectrum occupancy status.
VII.SPECRUM DECISION-MAKING
CR Networks require the capacity to decide the best spectrum
band among the available bands this notion is called spectrum
decision-making. It is closely related to channel characteristics
and operations of primary users because available spectrum
holes show variations overtime, each spectrum hole is
characteristics considering few parameters.
Interference: from the amount of interference at the
primary receiver, the permissible power of a CR can be
derived.
Path loss: the path loss is closely related to distance and
frequency as frequency increases, path loss increases
which results in transmission range.
Wireless link errors: Depending on modulating schemes
an interference, error rate changes.
Link layer delay: different types of link layer protocols are
required at different spectrum bands.
After characterization, appropriate bands are selected. To
describe the nature of CR Networks, primary user activity is
defined, which is the probability of appearance of primary
users during CR transmission. It is important to consider how
often the primary users appears on the spectrum band.
VIII. SPECTRUM SHARING
The share nature of wireless channels require the coordination
of attempts between CR users. Spectrum sharing can be
classified by four aspects namely architecture, spectrum
allocation behavior, spectrum access technique, and scope.
The first classification based on architecture
Centralized spectrum sharing: The spectrum allocation and
access procedures are controlled by a central entity. The central
entity can lease spectrum two users in a limited geographical
region for a specific amount of time.
Distributed spectral sharing: Spectrum allocation and access
are based on local policies performed by each node
distributively. They are also used between different networks.
The second classification is based on allocation behavior
Cooperative system sharing: Cooperative or collaborative
solutions exploit the interference measurement of each node
such that the effect of communication of one node on others is
considered.
Non-cooperative system sharing: Only a single node is
considered this selfish or non –collaborative technique results
in a certain degree of fairness, as well as improved throughput.
The third classification is based on access technology:
Overlay spectrum sharing: Nodes access the network using a
portion of a spectrum that has not been used by primary users.
Underlay spectrum sharing: The spread spectrum techniques
are exploited such that the transmission of a CR node is
regarded as a noise by primary users.
The fourth classification is based on scope:
Intranetwork spectrum sharing: Spectrum is allocated between
the entities of a CR network.
4. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 04 Issue: 01, June 2015 Page No.79-82
ISSN: 2278-2419
82
Internetwork spectrum sharing: It enables multiple system to
be deployed in overlapping locations and spectrum.
IX. SPECTRUM MOBILITY
After a CR captures the best available spectrum, Primary User
activity on the selected spectrum may necessitate that the users
change it’s operating spectrum bands, which is referred to as
Spectrum Mobility. It gives rise to a new type of handoff in CR
Networks, called as Spectrum Handoffs. Each time a CR user
changes it’s frequency of operation, a network protocol may
require modifications to the operation parameters. The purpose
of Spectrum Mobility in CR Networks is to ensure smooth and
fast transition leaving through minimum performance
degradation during a spectrum handoff.
X. CONCLUSION
Cognitive Radios are a promising source for usage of
underutilized network spectrum. As discussed, we saw how
Spectrum Sensing, Spectrum Decision-Making, Spectrum
Sharing and Spectrum Mobility manage spectrum in an
effective manner. It may be called as an asset to the modern
world in the future generations. Since it has an edge over
conventional methods in terms on interference, scarcity and
quality of service provided, it will create an impact not only in
the fields of networks, but also in the minds of network users.
References
[1] http://web.it.kth.se/~maguire/jmitola/Mitola_Dissertation8
_Integrated.pdf
[2] V. Valenta et al., "Survey on spectrum utilization in
Europe: Measurements, analyses and observations",
Proceedings of the Fifth International Conference on
Cognitive Radio Oriented Wireless Networks &
Communications (CROWNCOM), 2010
[3] J. Mitola III and G. Q. Maguire, Jr., "Cognitive radio:
making software radios more personal," IEEE Personal
Communications Magazine, vol. 6, nr. 4, pp. 13–18, Aug.
1999
IEEE 802.22
[4] Carl, Stevenson; G. Chouinard; Zhongding Lei; Wendong
Hu; S. Shellhammer; W. Caldwell (January 2009). "IEEE
802.22: The First Cognitive Radio Wireless Regional Area
Networks (WRANs) Standard = IEEE Communications
Magazine". IEEE Communications
Magazine (US: IEEE) 47 (1): 130–
138. doi:10.1109/MCOM.2009.4752688.
IEEE 802.15.2
[5] S. Haykin, "Cognitive Radio: Brain-empowered Wireless
Communications", IEEE Journal on Selected Areas of
Communications, vol. 23, nr. 2, pp. 201–220, Feb. 2005
[6] X. Kang et. al ``Sensing-Based Spectrum Sharing in
Cognitive Radio Networks, IEEE Transactions on
Vehicular Technology, vol. 58, no. 8, pp. 4649-4654, Oct
2009.
[7] http://www.eecs.berkeley.edu/wireless/posters/WFW05_c
ognitive.pdf
[8] http://ieeexplore.ieee.org/iel5/4234/30631/01413630.pdf?t
p=&arnumber=1413630&isnumber=30631
[9] Ian F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty,
"NeXt Generation/Dynamic Spectrum Access/Cognitive
Radio Wireless Networks: A Survey," Computer
Networks (Elsevier) Journal, September 2006. [1]
[10] Cognitive Functionality in Next Generation Wireless
Networks
[11] X. Kang et. al ``Optimal power allocation for fading
channels in cognitive radio networks: Ergodic capacity
and outage capacity, IEEE Trans. on Wireless Commun.,
vol. 8, no. 2, pp. 940-950, Feb 2009.
[12] H. Urkowitz Energy detection of unknown deterministic
signals, IEEE Proceedings, Apr. 1967.
[13] R. Tandra and A. Sahai, SNR walls for signal detection,
IEEE J. Sel. Topics Signal Process., vol. 2, no. 1, pp. 4 –
17, Feb. 2008.
[14] A. Mariani, A. Giorgetti, and M. Chiani, Effects of Noise
Power Estimation on Energy Detection for Cognitive
Radio Applications, IEEE Trans. Commun., vol. 50, no.
12, Dec., 2011.
[15] W. A. Gardner, Exploitation of spectral redundancy in
cyclostationary signals, IEEE Sig. Proc. Mag., vol. 8, no.
2, pp. 14 – 36, 1991.
[16] H. Sun, A. Nallanathan, C.-X. Wang, and Y.-F. Chen,
“Wideband spectrum sensing for cognitive radio networks:
a survey,” IEEE Wireless Communications, vol. 20, no. 2,
pp. 74–81, April 2013.