Siga este enlace para ver otros tipos de publicaciones sobre el tema: Cognitive radio transmitter.

Artículos de revistas sobre el tema "Cognitive radio transmitter"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Cognitive radio transmitter".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Lafia, Diafale, Mistura Laide Sanni, Rasheed Ayodeji Adetona, Bodunde Odunola Akinyemi, and Ganiyu Adesola Aderounmu. "Signal Processing-based Model for Primary User Emulation Attacks Detection in Cognitive Radio Networks." Journal of Computing and Information Technology 29, no. 2 (2022): 77–88. http://dx.doi.org/10.20532/cit.2021.1005297.

Texto completo
Resumen
Cognitive Radio Networks (CRNs) have been conceived to improve the efficiency of accessing the spectrum. However, these networks are prone to various kinds of attacks and failures that can compromise the security and performance of their users. One of the notable malicious attacks in cognitive radio networks is the Primary User Emulation (PUE) attack, which results in underutilization and unavailability of the spectrum and low operational efficiency of the network. This study developed an improved technique for detecting PUE attacks in cognitive radio networks and further addressed the charact
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Oni, Phillip Babatunde, Ruifeng Duan, and Mohammed Elmusrati. "Dual Analysis of the Capacity of Spectrum Sharing Cognitive Radio with MRC under Nakagami-m Fading." Conference Papers in Engineering 2013 (May 28, 2013): 1–8. http://dx.doi.org/10.1155/2013/572383.

Texto completo
Resumen
In this study, the maximum achievable information transmission rate of spectrum sharing cognitive radio with maximal ratio combining (MRC) antenna diversity technique is investigated when the channel between the secondary transmitter and the primary receiver and that between the secondary transmitter and the secondary receiver suffer Nakagami-m fading. With an assumption that both channels encounter Nakagami-m fading and the transmission of the secondary transmitter is subject to average interference power constraint, the approximated expressions for analyzing the effective capacity and the er
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Rahman, Md Zia Ur, P. V. S. Aswitha, D. Sriprathyusha, and S. K. Sameera Farheen. "Beamforming in cognitive radio networks using partial update adaptive learning algorithm." ACTA IMEKO 11, no. 1 (2022): 8. http://dx.doi.org/10.21014/acta_imeko.v11i1.1214.

Texto completo
Resumen
<p>Cognitive radio technology is a promising way to improve bandwidth efficiency. Frequency which is not used in any aspect will be utilized by using some of the most powerful resources in this cognitive radio. One of the main advantages of cognitive radio signal is to detect the different channels which are there in the spectrum and it can modify the frequencies which is utilized frequently. It allows the licensed users to gain the licensed bandwidth under the condition to protect the licensed users from harmful interference i.e., from secondary users. In this paper, we would like to im
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Lin, Pin-Hsun, Shih-Chun Lin, Chung-Pi Lee, and Hsuan-Jung Su. "Cognitive Radio with Partial Channel State Information at the Transmitter." IEEE Transactions on Wireless Communications 9, no. 11 (2010): 3402–13. http://dx.doi.org/10.1109/twc.2010.092410.090725.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Goel, Paurav, Avtar Singh, and Ashok Goel. "Transmit power control and data rate enhancement in cognitive radio network using computational intelligence." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 2 (2022): 1602. http://dx.doi.org/10.11591/ijece.v12i2.pp1602-1616.

Texto completo
Resumen
Underutilized radio frequencies are the chief apprehension in advance radio communication. The radio recourses are sparse and costly and their efficient allocation has become a challenge. Cognitive radio networks are the ray of hope. Cognitive radio networks use dynamic spectrum access technique to opportunistically retrieve and share the licensed spectrum. The licensed users are called primary users and the users that opportunistically access the licensed spectrum all called secondary users. The proposed system is a feedback system that work on demand and supply concept, in which secondary re
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Et. al., Dr Mahesh Kumar N,. "Analytical Model for Mitigating Primary User Emulation Attack using Hypothesis Testing in Cognitive Radio Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 11 (2021): 486–500. http://dx.doi.org/10.17762/turcomat.v12i11.5912.

Texto completo
Resumen
The Cognitive Radio (CR) is the key technology to deal with spectrum scarcity by allowing unlicensed CR users to coexist with existing users in licensed spectrum bands without interfering with binding communications. Cognitive technology provides the spectrum ability to be shared with licensed networks. This radio system can adjust its transmitter and recipient parameters on the basis of interaction with the current conditions in the environment. Due to this flexibility cognitive radios are exploring different types of threats and security attacks. In this paper, we focus primarily on the Prim
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Zhang, Xiaodong, Xiaowei Zhu, Jing Liu, and Changjiang You. "A low EVM zero-IF RF transmitter for cognitive radio application." Journal of Electronics (China) 27, no. 5 (2010): 723–27. http://dx.doi.org/10.1007/s11767-011-0500-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Ammar, Mahmoud Ali. "Performance Metrics in Cognitive Radio Networks." AL-MUKHTAR JOURNAL OF SCIENCES 36, no. 1 (2021): 73–79. http://dx.doi.org/10.54172/mjsc.v36i1.21.

Texto completo
Resumen
In Cognitive Radio Networks (CRN), the main aim is to allow the secondary users (SUs) to identify the empty bands and use them to transmit or receive data opportunistically. Primary users (PUs) have the priority to use a channel, while the secondary users must vacant this channel once a primary user requests it. An attack known in cognitive radio networks as a Primary User Emulation Attack (PUEA) aims to prevent the SU from using the empty bands. In this paper, an analytical and experimental approach is presented to mitigate the PUEA. This approach is based on obtaining the Probability Density
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

UM, Jung-Sun, Sung-Hyun HWANG, Chang-Joo KIM, and Byung Jang JEONG. "A Novel Transmitter and Receiver Structure for Cognitive Radio Based OFDM Systems." IEICE Transactions on Communications E94-B, no. 4 (2011): 1070–71. http://dx.doi.org/10.1587/transcom.e94.b.1070.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Tran, Hoai Trung. "Proposed Precoder for the Secondary Transmitter in the Cognitive MIMO Radio Network." International Journal of Computer Applications 183, no. 22 (2021): 20–26. http://dx.doi.org/10.5120/ijca2021921587.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Myung, Jungho, Yan Chen, K. J. Ray Liu, and Joonhyuk Kang. "Non-Cooperative Feedback Control Game for Secondary Transmitter in Cognitive Radio Network." IEEE Signal Processing Letters 20, no. 6 (2013): 571–74. http://dx.doi.org/10.1109/lsp.2013.2257755.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Ho-Van, Khuong, and Thiem Do-Dac. "Relaying Communications in Energy Scavenging Cognitive Networks: Secrecy Outage Probability Analysis." Wireless Communications and Mobile Computing 2019 (May 6, 2019): 1–13. http://dx.doi.org/10.1155/2019/2109837.

Texto completo
Resumen
This paper exploits a self-powered secondary relay to not only maintain but also secure communications between a secondary source and a secondary destination in cognitive radio networks when source-destination channel is unavailable. The relay scavenges energy from radio frequency (RF) signals of the primary transmitter and the secondary source and consumes the scavenged energy for its relaying activity. Under the maximum transmit power constraint, Rayleigh fading, the primary outage constraint, and the interference from the primary transmitter, this paper suggests an accurate closed-form expr
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Yadav, Suneel, Anshul Pandey, Dinh-Thuan Do, Byung Moo Lee, and Adão Silva. "Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints." Sensors 21, no. 21 (2021): 7160. http://dx.doi.org/10.3390/s21217160.

Texto completo
Resumen
Vehicular communication has been envisioned to support a myriad of essential fifth-generation and beyond use-cases. However, the increasing proliferation of smart and intelligent vehicles has generated a lot of design and infrastructure challenges. Of particular interest are the problems of spectrum scarcity and communication security. Consequently, we considered a cognitive radio-enabled vehicular network framework for accessing additional radio spectrum and exploit physical layer security for secure communications. In particular, we investigated the secrecy performance of a cognitive radio v
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Saher, Maria, Asjad Amin, Imran Ali Qureshi, Muhammad Ali Qureshi, and Muhammad Moazzam Jawaid. "Efficient Advanced Encryption Standard for Securing Cognitive Radio Networks." October 2018 37, no. 4 (2018): 645–54. http://dx.doi.org/10.22581/muet1982.1804.16.

Texto completo
Resumen
During the last decade, the CR (Cognitive Radio) came into view as a major wireless technology to resolve the issue of spectrum secrecy and efficient spectrum utilization. However, due to unlicensed (secondary) users, there are various security threats to the CRN (Cognitive Radio Networks). Some malicious users may access the CRN and mislead the secondary users to vacate the occupied channel, which may stop the communication. In this work, we propose a new cryptographic-based algorithm, CRAES (Cognitive Radio-Advanced Encryption Standard), inspired by the traditional AES to secure the CRN. The
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Li, Quanzhong, and Sai Zhao. "Robust Secure Beamforming Design for Cooperative Cognitive Radio Nonorthogonal Multiple Access Networks." Security and Communication Networks 2021 (March 18, 2021): 1–9. http://dx.doi.org/10.1155/2021/5526485.

Texto completo
Resumen
By the integration of cooperative cognitive radio (CR) and nonorthogonal multiple access (NOMA), cooperative CR NOMA networks can improve the spectrum efficiency of wireless networks significantly. Due to the openness and exposure of wireless signals, secure communication is an important issue for cooperative CR NOMA networks. In this paper, we investigate the physical layer security design for cooperative CR NOMA networks. Our objective is to achieve maximum secrecy rate of the secondary user by designing optimal beamformers and artificial noise covariance matrix at the multiantenna secondary
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Ho-Van, Khuong, and Thiem Do-Dac. "Security Enhancement for Energy Harvesting Cognitive Networks with Relay Selection." Wireless Communications and Mobile Computing 2020 (September 29, 2020): 1–13. http://dx.doi.org/10.1155/2020/8867148.

Texto completo
Resumen
Relay selection is proposed in this paper as an efficient solution to secure information transmission of secondary users against eavesdroppers in energy harvesting cognitive networks. The proposed relay selection method selects a secondary relay among available secondary relays, which are capable of harvesting radio frequency energy in signals of the secondary transmitter and correctly restore secondary message, to curtail signal-to-noise ratio at the wire-tapper. In order to evaluate the security performance of the suggested relay selection method, an exact intercept outage probability formul
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Guo, Lili, Qingwei Li, Fei Gao, Jiangzhi Fu, and Pei Guo. "A New Method of Generating Spectral Nulls at the Transmitter in Cognitive Radio." Wireless Personal Communications 88, no. 4 (2016): 819–37. http://dx.doi.org/10.1007/s11277-016-3207-y.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

S, Er Gowsalya,. "IDsMA: AN INTEGRATED DIGITAL SIGNATURE AND MUTUAL AUTHENTICATION MECHANISM FOR SECURING THE COGNITIVE RADIO NETWORKS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31071.

Texto completo
Resumen
IDsMA, an Integrated Digital Signature and Mutual Authentication mechanism, is proposed to enhance the security of Cognitive Radio Networks (CRNs). With the proliferation of wireless communication, CRNs face increasing vulnerabilities to unauthorized access and malicious attacks. IDsMA addresses these concerns by offering a robust solution that combines digital signatures and mutual authentication protocols. By employing digital signatures, IDsMA ensures the authenticity and integrity of transmitted data, mitigating the risk of data tampering or forgery. Additionally, mutual authentication pro
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Yu, Gui Cai, Cheng Zhi Long, and Man Tian Xiang. "Research on Dynamic Threshold Based Energy Detection in Cognitive Radio Systems." Advanced Materials Research 462 (February 2012): 506–11. http://dx.doi.org/10.4028/www.scientific.net/amr.462.506.

Texto completo
Resumen
In cognitive radio networks, nodes should have the capability to decide whether a signal from a primary transmitter is locally present or not in a certain spectrum within a short detection period. Traditional spectrum sensing schemes based on fixed threshold are sensitive to noise uncertainty, a fractional fluctuate of average noise power in a short time can lead the performance of spectrum detection drop seriously. This paper presents a new spectrum detection algorithm based on dynamic threshold. Theoretical results show that the proposed scheme debate the noise uncertainty, and good detectio
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Abbasi-Jannatabad, Mohsen, and Seyyed Mohammad Javad Asgari Tabatabaee. "Cooperative beamforming in cognitive radio systems without feedback of receiver beamforming vectors to transmitter." Wireless Networks 27, no. 3 (2021): 2067–79. http://dx.doi.org/10.1007/s11276-021-02541-1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Abraham, Shiny, and Dimitrie C. Popescu. "Joint transmitter adaptation and power control for cognitive radio networks with target SIR requirements." Physical Communication 9 (December 2013): 223–30. http://dx.doi.org/10.1016/j.phycom.2012.05.009.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Yi, Na, Yi Ma, and Rahim Tafazolli. "Underlay Cognitive Radio with Full or Partial Channel Quality Information." International Journal of Navigation and Observation 2010 (July 25, 2010): 1–12. http://dx.doi.org/10.1155/2010/105723.

Texto completo
Resumen
Underlay cognitive radios (UCRs) allow a secondary user to enter a primary user's spectrum through intelligent utilization of multiuser channel quality information (CQI) and sharing of codebook. The aim of this work is to study two-user Gaussian UCR systems by assuming the full or partial knowledge of multiuser CQI. Key contribution of this work is motivated by the fact that the full knowledge of multiuser CQI is not always available. We first establish a location-aided UCR model where the secondary user is assumed to have partial CQI about the secondary-transmitter to primary-receiver link as
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Xiao, Haitao, Limeng Dong, and Wenjie Wang. "Intelligent Reflecting Surface-Assisted Secure Multi-Input Single-Output Cognitive Radio Transmission." Sensors 20, no. 12 (2020): 3480. http://dx.doi.org/10.3390/s20123480.

Texto completo
Resumen
Intelligent reflecting surface (IRS) is a very promising technology for the development of beyond 5G or 6G wireless communications due to its low complexity, intelligence, and green energy-efficient properties. In this paper, we combined IRS with physical layer security (PLS) to solve the security issue of cognitive radio (CR) networks. Specifically, an IRS-assisted multi-input single-output (MISO) CR wiretap channel was studied. To maximize the secrecy rate of secondary users subject to a total power constraint (TPC) for the transmitter and interference power constraint (IPC) for a single ant
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Lin, Ruiquan, Hangding Qiu, Weibin Jiang, Zhenglong Jiang, Zhili Li, and Jun Wang. "Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks." Sensors 23, no. 2 (2023): 807. http://dx.doi.org/10.3390/s23020807.

Texto completo
Resumen
The paper studies the secrecy communication threatened by a single eavesdropper in Energy Harvesting (EH)-based cognitive radio networks, where both the Secure User (SU) and the jammer harvest, store, and utilize RF energy from the Primary Transmitter (PT). Our main goal is to optimize the time slots for energy harvesting and wireless communication for both the secure user as well as the jammer to maximize the long-term performance of secrecy communication. A multi-agent Deep Reinforcement Learning (DRL) method is proposed for solving the optimization of resource allocation and performance. Sp
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Tang, Kun, Wenjuan Tang, Entao Luo, Zhiyuan Tan, Weizhi Meng, and Lianyong Qi. "Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things." Security and Communication Networks 2020 (February 24, 2020): 1–10. http://dx.doi.org/10.1155/2020/7542726.

Texto completo
Resumen
In this paper, we consider the issue of the secure transmissions for the cognitive radio-based Internet of Medical Things (IoMT) with wireless energy harvesting. In these systems, a primary transmitter (PT) will transmit its sensitive medical information to a primary receiver (PR) by a multi-antenna-based secondary transmitter (ST), where we consider that a potential eavesdropper may listen to the PT’s sensitive information. Meanwhile, the ST also transmits its own information concurrently by utilizing spectrum sharing. We aim to propose a novel scheme for jointly designing the optimal paramet
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Liu, Rongpeng, Ziyang Wang, Xuerui Wang, et al. "Performance Analysis of Soft-Switching FSO/THz-RF Dual-Hop AF-NOMA Link Based on Cognitive Radio." Photonics 10, no. 10 (2023): 1086. http://dx.doi.org/10.3390/photonics10101086.

Texto completo
Resumen
This paper presents a promising solution to address the scarcity of spectrum resources and enhance spectrum efficiency in the context of cognitive radio (CR)-based soft-switching free-space optical (FSO)/terahertz (THz) radio frequency (RF) dual-hop amplify-and-forward (AF)–non-orthogonal multiple access (ROMANO) links. The impact of maximum tolerable interference power in the primary network, transmit power in the secondary transmitter, and maximum relay transmission power on the link are thoroughly studied. The numerical results ultimately validate the effectiveness of this link in improving
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Ghamari Adian, Mehdi. "Beamforming with Reduced Complexity in MIMO Cooperative Cognitive Radio Networks." Journal of Optimization 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/325217.

Texto completo
Resumen
An approach for beamforming with reduced complexity in MIMO cooperative cognitive radio networks (MIMO-CCRN) is presented. Specifically, a suboptimal approach with reduced complexity is proposed to jointly determine the transmit beamforming (TB) and cooperative beamforming (CB) weight vectors along with antenna subset selection in MIMO-CCRN. Two multiantenna secondary users (SU) constitute the desired link, one acting as transmitter (SU TX) and the other as receiver (SU RX) and they coexist with single-antenna primary and secondary users. Some of single antenna secondary users are recruited by
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Diet, Antoine M., Nicolas Ribière-Tharaud, Martine Villegas, and Geneviève Baudoin. "Front-end HPA/antenna for multi-radio." International Journal of Microwave and Wireless Technologies 4, no. 5 (2012): 483–93. http://dx.doi.org/10.1017/s1759078712000372.

Texto completo
Resumen
This paper focuses on multi-radio front-end transmitter, a function implied by cognitive radio (0.5–6 GHz). S and C bands standards (wireless local and metropolitan area networks) present a challenge, due to the signal modulation schemes (orthogonal frequency division multiplex (OFDM)/WCDMA, wideband code division multiple access) dynamic (tens of dBs), driving us to a mandatory transmitter linearization. The idea is to provide frequency, flexibility, and average power control of a multi-radio high-efficiency front end for such signals (polar/envelope elimination and restoration (EER) structur
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Zhao, Feng, Hongsheng Wu, Hongbin Chen, and Wen Wang. "Game-Theoretic Beamforming and Power Allocation in MIMO Cognitive Radio Systems with Transmitter Antenna Correlation." Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/427847.

Texto completo
Resumen
Multi-input multioutput (MIMO) technique provides a promising solution to enhance the performance of wireless communication systems. In this paper, we consider antenna correlation at the transmitter in practical cognitive MIMO systems. What is more, a game-theoretic framework is conducted to analyze the optimum beamforming and power allocation such that each user maximizes its own rate selfishly under the transmitting power constraint and the primary user (PU) interference constraint. The design of the cognitive MIMO system is formulated as a noncooperative game, where the secondary users (SUs
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Ho-Van, Khuong, and Thiem Do-Dac. "Impact of Artificial Noise on Security Capability of Energy Harvesting Overlay Networks." Wireless Communications and Mobile Computing 2021 (June 19, 2021): 1–12. http://dx.doi.org/10.1155/2021/9976837.

Texto completo
Resumen
Artificial noise, energy harvesting, and overlay communications can assure design metrics of modern wireless networks such as data security, energy efficiency, and spectrum utilization efficiency. This paper studies impact of artificial noise on security capability of energy harvesting overlay networks in which the cognitive transmitter capable of self-powering its operation by harvesting radio frequency energy and self-securing its communications against eavesdroppers by generating artificial noise amplifies and forwards the signal of the primary transmitter as well as transmits its individua
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Chen, Xiaolong, Xiangbo Meng, Xiaoshi Song, Yuting Geng, and Chun Shan. "Coverage probability in cognitive radio networks powered by renewable energy with primary transmitter assisted protocol." Information Sciences 400-401 (August 2017): 14–29. http://dx.doi.org/10.1016/j.ins.2017.03.012.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Zhao, Cai Dan, Fu Jia Yan, Ming Hui Gao, and Lian Fen Huang. "Transient Signal Feature Extraction Based on Box Dimension and the Largest Lyapunov Dimension." Advanced Materials Research 756-759 (September 2013): 3607–10. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3607.

Texto completo
Resumen
Cognitive radio is one kind of wireless communication technology, which is to effectively improve the spectrum efficiency by the way of wireless spectrum sensing. Besides of varieties of security issues of the traditional wireless communication, it also has some new problems, such as Primary User Emulation (PUE) attack. This essay presents that based on the fractal dimension of the transient signal characteristics extraction to protect the PUE attack from the cognitive wireless networks, and then extract the fractal dimension of wireless transmitter through experiments to provide reliable char
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Liu, Zhangyu, Ji Wang, Hao Jiang, Jun Wang, Xingwang Li, and Wenwu Xie. "Physical Layer Security Performance Analysis of IRS-Aided Cognitive Radio Networks." Electronics 12, no. 12 (2023): 2615. http://dx.doi.org/10.3390/electronics12122615.

Texto completo
Resumen
Cognitive radio (CR) acts as a significant player in enhancing the spectral efficiency (SE) of wireless telecommunications; simultaneously, the intelligent reflecting surface (IRS) technique is a valid technique for increasing the confidentiality properties of wireless telecommunications systems through the modulation of the amplitude and phase shift of the channel. Therefore, we take into consideration an IRS-assisted multiple-input single-output (MISO) CR system to raise the confidentiality rate, which is composed of a primary network with a primary receiver (PR) and an eavesdropping link, a
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Sadhana D. Poshattiwar, Sandip B. Shrote ,. "Dynamic Spectrum Sensing For 5G Cognitive Radio Networks Using Optimization Technique." Journal of Electrical Systems 20, no. 3s (2024): 1221–31. http://dx.doi.org/10.52783/jes.1433.

Texto completo
Resumen
With increasing development of 5G technology, the rapid growth of various technologies and the growth of various wireless devices, demand for wireless spectrum becomes more urgent. Wireless communication technologies have been advancing rapidly, leading to the emergence of 5G communication systems .Spectrum sensing is the key model utilized to access the spectrum dynamically in CRN. Various researchers are done in spectrum sensing scenario and different methods are designed to perform the task of spectrum resource sharing. Most of the methods design a decision statistics for identifying the si
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Liu, Xiaoying, Ming Xia, Ping Hu, Kechen Zheng, and Shubin Zhang. "Optimal Time Allocation for Energy Harvesting Cognitive Radio Networks with Multichannel Spectrum Sensing." Wireless Communications and Mobile Computing 2022 (August 21, 2022): 1–11. http://dx.doi.org/10.1155/2022/3940132.

Texto completo
Resumen
From the perspective of time domain and frequency domain, we investigate the energy harvesting cognitive radio networks (EH-CRNs) with multichannel, where the secondary transmitter (ST) opportunistically accesses the licensed subchannels to transmit packets by consuming the harvested energy. To explore the spectrum holes and improve the lifetime of the EH-CRNs, the ST scavenges energy from the radio-frequency (RF) signal in the wide band during the energy harvesting (EH) phase and exploits the harvested energy for sequential sensing and packet transmission during the rest of the time slot. Und
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Ho-Van, Khuong, and Thiem Do-Dac. "Relay Selection for Security Improvement in Cognitive Radio Networks with Energy Harvesting." Wireless Communications and Mobile Computing 2021 (June 19, 2021): 1–16. http://dx.doi.org/10.1155/2021/9921782.

Texto completo
Resumen
This paper selects an unlicensed relay among available self-powered relays to not only remain but also secure information transmission from an unlicensed source to an unlicensed destination. The relays harvest energy in signals of the unlicensed source and the licensed transmitter. Then, they spend the harvested energy for their relaying operation. Conditioned on the licensed outage restriction, the peak transmission power restriction, Rayleigh fading, and the licensed interference, the current paper proposes an exact closed-form formula of the secrecy outage probability to quickly evaluate th
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Lee, Wilaiporn, Kornkamol Thakulsukanant, Kanabadee Srisomboon, and Akara Prayote. "Adaptive Two-stage Spectrum Sensing under Noise Uncertainty in Cognitive Radio Networks." ECTI Transactions on Electrical Engineering, Electronics, and Communications 14, no. 1 (2015): 21–35. http://dx.doi.org/10.37936/ecti-eec.2016141.171084.

Texto completo
Resumen
To utilize licensed spectrum bands efficiently, spectrum sensing needs to be accurate and fast. The occurrence of noise uncertainty and the lower in received PU signal power due to the distance between the transmitter and the receiver, path loss, are the main challenges that has a great impact on the accuracy of spectrum sensing.
 In this paper, we propose a new scheme of two-stage spectrum sensing, “Adaptive Two-stage Spectrum Sensing (ATSS)”, under noise uncertainty environment. ATSS is a modified of a conventional two-stage spectrum sensing where the decision threshold of both stages a
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Awe, Olusegun Peter, Daniel Adebowale Babatunde, Sangarapillai Lambotharan, and Basil AsSadhan. "Second order Kalman filtering channel estimation and machine learning methods for spectrum sensing in cognitive radio networks." Wireless Networks 27, no. 5 (2021): 3273–86. http://dx.doi.org/10.1007/s11276-021-02627-w.

Texto completo
Resumen
AbstractWe address the problem of spectrum sensing in decentralized cognitive radio networks using a parametric machine learning method. In particular, to mitigate sensing performance degradation due to the mobility of the secondary users (SUs) in the presence of scatterers, we propose and investigate a classifier that uses a pilot based second order Kalman filter tracker for estimating the slowly varying channel gain between the primary user (PU) transmitter and the mobile SUs. Using the energy measurements at SU terminals as feature vectors, the algorithm is initialized by a K-means clusteri
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Liu, Zi Jun, Zhan Gao, Guo Xin Li, and Hai Tao Zhang. "Optimal Beam-Forming Design in Cognitive Relay Networks under Interference Threshold." Advanced Materials Research 850-851 (December 2013): 561–66. http://dx.doi.org/10.4028/www.scientific.net/amr.850-851.561.

Texto completo
Resumen
Recently, a new model for cognitive radio networks appears, in which a cognitive user (CU) can relay the primary data stream to improve the performance of the primary user s communication. Traditionally, the transmitter of the cognitive users will send data to the receiver of the cognitive users and relay the data sent from the primary user (PU) in different time slots. However, Multiple Input Multiple Output (MIMO) provides a remarkable increase in the spectral efficiency, which can transmit multiple independent data streams in a time slot with MIMO antenna. Based on the MIMO technique, we pr
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Xu, Ding, and Qun Li. "Optimal Power Allocation for CC-HARQ-based Cognitive Radio with Statistical CSI in Nakagami Slow Fading Channels." Frequenz 71, no. 1-2 (2017): 65–72. http://dx.doi.org/10.1515/freq-2015-0268.

Texto completo
Resumen
Abstract This paper addresses the power allocation problem for cognitive radio (CR) based on hybrid-automatic-repeat-request (HARQ) with chase combining (CC) in Nakagamimslow fading channels. We assume that, instead of the perfect instantaneous channel state information (CSI), only the statistical CSI is available at the secondary user (SU) transmitter. The aim is to minimize the SU outage probability under the primary user (PU) interference outage constraint. Using the Lagrange multiplier method, an iterative and recursive algorithm is derived to obtain the optimal power allocation for each t
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Ge, Weili, Zhengyu Zhu, Zhongyong Wang, and Zhengdao Yuan. "AN-Aided Transmit Beamforming Design for Secured Cognitive Radio Networks with SWIPT." Wireless Communications and Mobile Computing 2018 (August 13, 2018): 1–13. http://dx.doi.org/10.1155/2018/6956313.

Texto completo
Resumen
We investigate multiple-input single-output secured cognitive radio networks relying on simultaneous wireless information and power transfer (SWIPT), where a multiantenna secondary transmitter sends confidential information to multiple single-antenna secondary users (SUs) in the presence of multiple single-antenna primary users (PUs) and multiple energy-harvesting receivers (ERs). In order to improve the security of secondary networks, we use the artificial noise (AN) to mask the transmit beamforming. Optimization design of AN-aided transmit beamforming is studied, where the transmit power of
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Nguyen, Binh Van, Hyoyoung Jung, Dongsoo Har, and Kiseon Kim. "Performance Analysis of a Cognitive Radio Network With an Energy Harvesting Secondary Transmitter Under Nakagami- ${m}$ Fading." IEEE Access 6 (2018): 4135–44. http://dx.doi.org/10.1109/access.2018.2791581.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Dung, Le, and Seong-Gon Choi. "Connectivity Analysis of Cognitive Radio Ad-Hoc Networks with Multi-Pair Primary Networks." Sensors 19, no. 3 (2019): 565. http://dx.doi.org/10.3390/s19030565.

Texto completo
Resumen
In this paper, we study the connectivity of cognitive radio ad-hoc networks (CRAHNs) where primary users (PUs) and secondary users (SUs) are randomly distributed in a given area following a homogeneous Poisson process. Moreover, for the sake of more realistic CRAHNs, contrary to previous works in the literature, we consider the case that primary network is comprised of multiple communication pairs which are spatial-temporal distributed in the network area. We also take into consideration the differences in transmission range and interference range of both PUs and SUs. The connectivity of such
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Sultan, Kiran. "Computational-Intelligence-Based Spectrum-Sharing Scheme for NOMA-Based Cognitive Radio Networks." Applied Sciences 13, no. 12 (2023): 7144. http://dx.doi.org/10.3390/app13127144.

Texto completo
Resumen
The integration of non-orthogonal multiple access (NOMA) technology and cognitive radio networks (CRNs) promises to enhance the spectrum utilization efficiency of 5G and beyond-5G (B5G) mobile communication systems. In this article, a NOMA-based spectrum-sharing scheme is proposed for dual-hop CRNs in which a primary transmitter separated by a long distance from the primary receiver communicates via NOMA-based CRN. In this scenario, we mathematically formulate a constrained optimization problem to maximize the sum rate of all secondary users (SUs) while maintaining the total transmit power of
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Khalid, Waqas, Heejung Yu, and Song Noh. "Residual Energy Analysis in Cognitive Radios with Energy Harvesting UAV under Reliability and Secrecy Constraints." Sensors 20, no. 10 (2020): 2998. http://dx.doi.org/10.3390/s20102998.

Texto completo
Resumen
The integration of unmanned aerial vehicles (UAVs) with a cognitive radio (CR) technology can improve the spectrum utilization. However, UAV network services demand reliable and secure communications, along with energy efficiency to prolong battery life. We consider an energy harvesting UAV (e.g., surveillance drone) flying periodically in a circular track around a ground-mounted primary transmitter. The UAV, with limited-energy budget, harvests radio frequency energy and uses the primary spectrum band opportunistically. To obtain intuitive insight into the performance of energy-harvesting, an
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

K. S., Nandini, and S. A. Hariprasad. "Optimal Spectrum Sensor Assignment in Multi-channel Multi-user Cognitive Radio Networks." Journal of Telecommunications and Information Technology 8 (December 28, 2018): 88–96. http://dx.doi.org/10.26636/jtit.2018.124017.

Texto completo
Resumen
Accurate detection of spectrum holes is the most important and critical task in any cognitive radio (CR) communication system. When a single spectrum sensor is assigned to detect a specific primary channel, then the detection may be unreliable because of noise, random multipath fading and shadowing. Also, even when the primary channel is invisible at the CR transmitter, it may be visible at the CR receiver (the hidden primary channel problem). With a single sensor per channel, a high and consistently uniform level of sensitivity is required for reliable detection. These problems are solved by d
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Garcia, Carla E., Mario R. Camana, and Insoo Koo. "Secrecy Energy Efficiency Maximization in an Underlying Cognitive Radio–NOMA System with a Cooperative Relay and an Energy-Harvesting User." Applied Sciences 10, no. 10 (2020): 3630. http://dx.doi.org/10.3390/app10103630.

Texto completo
Resumen
Security is considered a critical issue in the deployment of 5G networks because of the vulnerability of information that can be intercepted by eavesdroppers in wireless transmission environments. Thus, physical layer security has emerged as an alternative for the secure enabling of 5G technologies and for tackling this security issue. In this paper, we study the secrecy energy efficiency (SEE) in a downlink underlying cognitive radio (CR)—non-orthogonal multiple access (NOMA) system with a cooperative relay. The system has an energy-harvesting (EH) user and an eavesdropper, where the transmit
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Minh Nam, Pham, Ha Duy Hung, Lam-Thanh Tu, Pham Viet Tuan, Tran Trung Duy, and Tan Hanh. "Outage Performance of Interference Cancellation-Aided Two-Way Relaying Cognitive Network with Primary TAS/SC Communication and Secondary Partial Relay Selection." Electronics 11, no. 22 (2022): 3645. http://dx.doi.org/10.3390/electronics11223645.

Texto completo
Resumen
In this paper, we propose a two-way relaying scheme using digital network coding in an underlay cognitive radio network. In the proposed scheme, the transmit antenna selection and selection techniques are combined using a primary transmitter and a primary receiver, respectively. In the secondary network, two source nodes that cannot directly communicate attempt to exchange their data with each other. As a result, the relaying technique using partial relay selection is applied to assist the data exchange. Particularly, at the first time slot, the selected secondary relay applies an interference
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Sudha, Y., and V. Sarasvathi. "A Model-Free Cognitive Anti-Jamming Strategy Using Adversarial Learning Algorithm." Cybernetics and Information Technologies 22, no. 4 (2022): 56–72. http://dx.doi.org/10.2478/cait-2022-0039.

Texto completo
Resumen
Abstract Modern networking systems can benefit from Cognitive Radio (CR) because it mitigates spectrum scarcity. CR is prone to jamming attacks due to shared communication medium that results in a drop of spectrum usage. Existing solutions to jamming attacks are frequently based on Q-learning and deep Q-learning networks. Such solutions have a reputation for slow convergence and learning, particularly when states and action spaces are continuous. This paper introduces a unique reinforcement learning driven anti-jamming scheme that uses adversarial learning mechanism to counter hostile jammers.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Kollár, Zsolt, Lajos Varga, Bálint Horváth, Péter Bakki, and János Bitó. "Evaluation of Clipping Based Iterative PAPR Reduction Techniques for FBMC Systems." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/841680.

Texto completo
Resumen
This paper investigates filter bankmulticarrier (FBMC), a multicarrier modulation technique exhibiting an extremely low adjacent channel leakage ratio (ACLR) compared to conventional orthogonal frequency division multiplexing (OFDM) technique. The low ACLR of the transmitted FBMC signal makes it especially favorable in cognitive radio applications, where strict requirements are posed on out-of-band radiation. Large dynamic range resulting in high peak-to-average power ratio (PAPR) is characteristic of all sorts of multicarrier signals. The advantageous spectral properties of the high-PAPR FBMC
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!