DMCA
BANDWIDTH REDUCTION IN COGNITIVE RADIO
Citations
633 |
III, Cognitive radio: An Integrated Agent Architecture for Software Defined Radio
- Mitola
- 2000
(Show Context)
Citation Context ...technology in wireless communication by which the spectrum is vigorously utilized when the primary user, the authorized holder of the spectrum, is not in. The idea of cognitive radio is introduced in =-=[9]-=-. Interpreting to this notion the cognitive radio has the capability to evaluate the radio surroundings and boost the decision permitting to the transmission parameters such as modulation scheme, powe... |
446 | A Survey of Dynamic Spectrum Access
- Zhao, Sadler
- 2007
(Show Context)
Citation Context ...nterference temperature model of [4] is necessary for the primary receiver to dose the interference boundary, henceforth the secondary user can transmit beneath the set level. The fundamental plan in =-=[20]-=- is to matter license spectrum to secondary users and guaranteed the interference perceived through primary users. To protect the primary user commencing the interference triggered by the secondary us... |
287 | Cooperative sensing among cognitive radios
- Mishra, Sahai, et al.
- 2006
(Show Context)
Citation Context ...ary user devoid of making interference to the primary user. However, the secondary users need to recurrently monitor the management of the spectrum to repel from interfering with the primary user(see =-=[8]-=-). Overlay and underlay stay with spectrally modulated and spectrally encoding (SMSE) procedure all beside with code division multiple access (CDMA) and orthogonal frequency division multiple access (... |
70 | In-Band Spectrum Sensing in Cognitive Radio Networks: Energy Detection or Feature Detection
- Kim, Shin
- 2008
(Show Context)
Citation Context ...he sensing is necessary for the interweave scheme. However, dissimilar type of the sensing procedures are used to identify the primary user and elude the interference shaped by the secondary user. By =-=[6]-=- for primary user detection, three prominent methods known as: energy detection, feature detection and match filter are getting attention. In cognitive radio secondary user, permitted to use a spectru... |
64 | The throughput potential of cognitive radio: A theoretical perspective
- Srinivasa, Jafar
- 2007
(Show Context)
Citation Context ...sers and guaranteed the interference perceived through primary users. To protect the primary user commencing the interference triggered by the secondary user through transmission, Srinivasa and Jafar =-=[16]-=- offered an organization of transmission models as: Interweave, overlay and underlay. By [9], in the interweave model the secondary user utilized the primary under utilized spectrum opportunistically ... |
28 | Achievable capacity under the interference temperature model
- Clancy
- 2007
(Show Context)
Citation Context ...in capacity and keep the interference at the primary user at the given start and endure the complete transmission power inside properties. Alternative inkling of the interference temperature model of =-=[4]-=- is necessary for the primary receiver to dose the interference boundary, henceforth the secondary user can transmit beneath the set level. The fundamental plan in [20] is to matter license spectrum t... |
9 | Divisibility properties in semigroup rings - Gilmer, Parker - 1974 |
6 |
98052. Allocating dynamic time-spectrum blocks
- Yuan, Bahl, et al.
- 2007
(Show Context)
Citation Context ...reless mesh network is practiced for terminal to terminal bandwidth allocation which used the routing and scheduling algorithms. The Max - min model is used for allocation of a fair bandwidth. In the =-=[19]-=- TV band is utilized for the cognitive radio over sensing and opportunistically use the vacant frequencies. The diverse protocols are used for centralized and decentralized spectrum distribution. By u... |
4 | Modulation and Coding Techniques in Wireless Communications. - Krouk, Semenov - 2011 |
3 |
Joint overlay and underlay power allocation scheme for OFDM-based cognitive radio systems,”
- Bansal, Duval, et al.
- 2010
(Show Context)
Citation Context ...has the capability to evaluate the radio surroundings and boost the decision permitting to the transmission parameters such as modulation scheme, power, carrier frequency, bandwidth and code rate. By =-=[3]-=- power is allocated to entire bandwidth for upsurge in capacity and keep the interference at the primary user at the given start and endure the complete transmission power inside properties. Alternati... |
2 | Encoding through generalized polynomial codes - Shah, Khan, et al. |
2 |
Constructions of codes through semigroup ring B[x
- Shah, Khan, et al.
(Show Context)
Citation Context ... 1 j 2 + · · ·+ gr, 1 j x 1 j r Andrade and Shah has constructed cyclic codes over a local finite commutative ring R, through the monoid rings R[x; 13Z0],R[x; 1 2Z0] and R[x; 1 22Z0] in [1], [12] and =-=[13]-=-, respectively. However, in [14] the cyclic codes of certain types are discussed corresponding to the ascending chain of monoid rings. 3. Bandwidths of n length BCH code and 2j−1(n+ 1)n lengths cyclic... |
2 | Efficient and fair bandwidth allocation in multichannel cognitive radio networks
- Xu, Jung, et al.
- 2012
(Show Context)
Citation Context ...boundaries for channel capacity. Two transmitters having the primary and secondary messages go through the channel which was received at the receivers with distinct primary and secondary messages. By =-=[18]-=-, improvement of spectral efficiency in cognitive radio can be achieved by the secondary user through the consent to utilize the untrustworthy part of the spectrum which is assigned to the primary use... |
1 |
A note on linear codes over semigroup rings
- Andrade, Shah, et al.
- 2011
(Show Context)
Citation Context ... j + g2, 1 j x 1 j 2 + · · ·+ gr, 1 j x 1 j r Andrade and Shah has constructed cyclic codes over a local finite commutative ring R, through the monoid rings R[x; 13Z0],R[x; 1 2Z0] and R[x; 1 22Z0] in =-=[1]-=-, [12] and [13], respectively. However, in [14] the cyclic codes of certain types are discussed corresponding to the ascending chain of monoid rings. 3. Bandwidths of n length BCH code and 2j−1(n+ 1)n... |
1 | Dynamic spectrum access based on cognitive radio within cellular networks
- Alam, Dooley, et al.
- 2011
(Show Context)
Citation Context ...erference to the primary user. The request of wireless devices is increasing every day. Therefore, efficient utilization of spectrum is a burring subject to decrease the spectrum over crowdedness. By =-=[2]-=-, the overlay model permits the concurrent transmission of primary and secondary users. The secondary transmitter is supposed to have awareness of the primary message and use for sinking the interfere... |
1 |
Cognitive radio design: an SDR approach
- Doost-Mohammady
(Show Context)
Citation Context ... (the case q = 2). Thus, modulation is a map M : Fmq → S defined as s (t) = s(v(t)), where s(t) ∈ S and S is a subset of N -dimensional real Euclidean space, that is, S ⊂ RN [7, Chapter 7]. Following =-=[10]-=-, the bandwidth required for an (n, k) code is W = Ru m ( 1 R ), where m = log2M , Ru is the source data (transmission) rate and R = k n the code rate. The bandwidth may be maximize and minimize, depe... |
1 |
Construction and decoding of cyclic codes of lenghts 2m(n + 1)n, where m ≥ 0, for a BCH code of length n, submitted to Journal of Franklin Institute
- Shah, Khan, et al.
(Show Context)
Citation Context ...se the best possible bandwidth out of the different many collections of bandwidths. Furthermore in [18], different spectrum sharing procedure is considered to improve the cognitive radio networks. In =-=[11]-=- it is established that for a given binary BCH code C0n of length n generated by a polynomial g(x) of F2[x] of degree r there exists a sequence of binary cyclic codes {C j 2j−1(n+1)n}j≥1 such that for... |
1 |
Ascending chains of semigroup rings and encoding: coding and cryptography
- Shah, Khan, et al.
- 2010
(Show Context)
Citation Context ...Andrade and Shah has constructed cyclic codes over a local finite commutative ring R, through the monoid rings R[x; 13Z0],R[x; 1 2Z0] and R[x; 1 22Z0] in [1], [12] and [13], respectively. However, in =-=[14]-=- the cyclic codes of certain types are discussed corresponding to the ascending chain of monoid rings. 3. Bandwidths of n length BCH code and 2j−1(n+ 1)n lengths cyclic codes 3.1. Cyclic codes through... |
1 |
Bang Chul Jung, Song Chong and Dan Keun Sung. Opportunistic underlay transmission in multi-carrier cognitive radio systems
- Son
- 2009
(Show Context)
Citation Context ...ay stay with spectrally modulated and spectrally encoding (SMSE) procedure all beside with code division multiple access (CDMA) and orthogonal frequency division multiple access (OFDMA). According to =-=[15]-=-, in underlay, primary and secondary user transmit the data concurrently 1Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan, stariqshah@gmail.com, 2School of Engineering and Appl... |
1 |
Hincapié, Guoliang Xue, Weiyi Zhang and Roberto Bustamante. Fair bandwidth allocation in wireless mesh networks with cognitive radios
- Tang, Roberto
- 2010
(Show Context)
Citation Context ...ll not produce interference for primary user during simultaneous transmission. Similarly, the allowing surroundings for these models may damage the transmission of both primary and secondary user. In =-=[17]-=- wireless mesh network is practiced for terminal to terminal bandwidth allocation which used the routing and scheduling algorithms. The Max - min model is used for allocation of a fair bandwidth. In t... |