Total views : 635

A Novel Technique for Optimal Power Allocation Efficient Spectrum Sharing Radio Cognitive Networks

Affiliations

  • Department of Computer Science and Engineering, Koneru Lakshmaiah University, Green Fields,Vaddeswaram, Guntur 522502, Andhra Pradesh, India

Abstract


Cognitive Radio (CR) innovation helps in contriving remote framework for satisfactory sending of radio range with it’s foresee procedure, self-adjustment and range allotment. Range assignment is a sufficient technique for ease the shortage of radio range issue by permitting unlicensed clients (optional clients) to agree with authorized clients (essential clients) under the situation of shielding the later from antagonistic obstruction. In this paper, we consideration on the throughput expansion of range designation Intellectual Radio (IR) systems and present an inventive subjective radio plan that will fundamentally propel their achievable throughput all the more accurately, a novel recipient and a pen structure for range portion is presented. The issue of fantastic force distribution approach that boosts the ergodic amount of the framework under moderate transmits and impedance power restriction are additionally considered.

Keywords

Cognitive Radio, Optimal Power Allocation, Spectrum Sharing, Throughput Maximization.

Full Text:

 |  (PDF views: 178)

References


  • Federal Communication Commission. Spectrum policy task force report. Washington, DC; 2002 Nov. p. 02–155.
  • Mitola J, Maguire GQ. Cognitive radios: making software radio more personal. Institute of Electrical and Electronics Engineers (IEEE) Personal Communications. 1999 Aug; 6(4):13–8.
  • Ghasemi, Sousa ES. Fundamental limits of spectrum sharing in fading environments. Institute of Electrical and Electronics Engineers (IEEE) Transactions on Wireless Communications. 2007 Feb; 6(2):649–58.
  • Kang X, Liang YC, Garg HK, Zhang L. Sensing-based spectrum sharing in CR networks. Institute of Electrical and Electronics Engineers (IEEE) Transactions on Vehicular Technology. 2009 Oct; 58(8):4649–54.
  • Stotas S, Nallanathan A. Optimal sensing time and power allocation in multiband CR networks. Institute of Electrical and Electronics Engineers (IEEE) Transactions on Communications. 2011 Jan; 59(1):226–35.
  • Gunasekhar T, Rao KT, Reddy VK, Kiran PS, Rao BT. Mitigation of insider attacks through multicloud.International Journal of Electrical and Computer Engineering. 2015; 5(1):136.
  • Liang YC, Zeng Y, Peh ECY, Hoang AT. Sensing-throughput tradeoff for CR networks. Institute of Electrical and Electronics Engineers (IEEE) Transactions on Wireless Communications. 2008 Apr; 7(4):1326–37.
  • Musavian L, Aïssa S. Ergodic and outage capacities of spectrum sharing systems in fading channels. In the Proceedings of Institute of Electrical and Electronics Engineers (IEEE) Global Communications Conference (GLOBECOM),Washington, DC; 2007 Nov. p. 3327–31.
  • Kang X, Liang YC, Nallanathan A, Garg HK, Zhang R.Optimal power allocation for fading channels in CR networks: Ergodic capacity and outage capacity. Institute of Electrical and Electronics Engineers (IEEE) Transactions on Wireless Communications. 2009 Feb; 8(2):940–50.
  • Gunasekhar T, Rao KT. Electronic Brake Control Module (EBCM): Single encryption, multiple decryptions.International Journal of Applied Engineering Research.2014; 9(19):5885–93.
  • Srinivasa S, Jafar SA. CR networks: how much spectrum sharing is optimal? In the Proceedings of Institute of Electrical and Electronics Engineers (IEEE) Global Telecommunications Conference; 2007 Nov. p. 3149–53.
  • Wadhwa M, Xin C, Song M, Park EK. Throughput analysis for a contention -based dynamic spectrum sharing model.Institute of Electrical and Electronics Engineers (IEEE) Transaction on Wireless Communications. 2010 Apr; 9(4).
  • Gunasekhar T, Rao KT, Basu MT. Understanding insider attack problem and scope in cloud. In Circuit, Power and Computing Technologies (ICCPCT), International Conference on Institute of Electrical and Electronics Engineers (IEEE); 2015 Mar. p. 1–6.
  • Gunasekhar T, Rao KT, Basu MT. Understanding insider attack problem and scope in cloud. In Circuit, Power and Computing Technologies (ICCPCT), International Conference on on Institute of Electrical and Electronics Engineers (IEEE); 2015 Mar. p. 1–6.
  • Bhattacharjee S, Bhattacharjee S, Konar A, Roy P.Throughput analysis for a dynamic spectrum sharing model with finite PU’s and infinite SUs. IEEE International Conference on Computer Science and Information Technology (ICCSIT); 2011 10–12 Jun. International Journal of Machine Learning and Computing. 2011 Oct; 1(4).
  • Vurukonda N, Rao BT, Reddy BT. A secured cloud data storage with access privileges. International Journal of Electrical and Computer Engineering (IJECE). 2016 Oct; 6(5):2338–44.
  • Rao BT. A study on data storage security issues in cloud computing. Procedia Computer Science. 2016; 92:128–35.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.