The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider a scenario consisting of a primary and a secondary system, each represented by a pair of a transmitter and a receiver. The secondary transmitter assists in the retransmission of the primary message, which prevents the primary performance from being degraded by allowing the secondary system to access the transmission resources. Two network coding schemes applied in retransmission phase...
This paper investigates cooperation for secrecy in cognitive radio networks. In particular, we consider a four-node cognitive scenario where the secondary receiver is treated as a potential eavesdropper with respect to the primary transmission. The cognitive transmitter can help the primary transmission, and it should also ensure that the primary message is not leaked to the secondary user. We consider...
A novel adaptive power control and beam-forming joint optimization algorithm is proposed in cognitive radio (CR) underlay networks, where cognitive network share spectrum with primary network which spectrum is licensed. In this paper, both primary base station (PBS) and cognitive base station (CBS) are all equipped with multi antennas, while each primary user (PU) and cognitive user (CU) has only...
This paper explores the trade-off between cooperation and secrecy in cognitive radio networks. We consider a scenario consisting of a primary and a secondary system. In the simplest case, each system is represented by a pair of transmitter and receiver. We assume a secrecy constraint on the transmission in the sense that the message of the primary transmitter has to be concealed from the secondary...
In this paper, we consider a collaborative routing strategy in cognitive radio network. We define a system model and a pricing scheme as a means to stimulate cooperation in users. Assuming that cognitive radio base station sets prices for the network profit maximization according to the interferences caused by secondary users to primary users, we propose an iterative price adaptation algorithm to...
Long term evolution (LTE) is one of the most effective techniques to improve the capacity and bit of communication. In order to detect the presence of the primary user signal with high probability in LTE, spectrum sensing is a fundamental requirement to achieve the goal of cognitive radio (CR). we consider cooperative spectrum sensing in LTE based on energy detection. This is a basic condition for...
In this paper, we consider that cooperative frequency spectrum sensing based on the spatial spectral estimation in cognitive radio sensor networks. We propose an algorithm that estimates the interference temperature of this model using a generalization of the DOA (direction of arrival) algorithm. From this, we find the interference temperature and show that it does become smaller. We compare our method...
Majority of evaluation methods on interference temperature algorithms are based on the assumption that either the interference signals or the user's signals are no directions. This is a mathematical constraint that is not satisfied in many applications. In fact, without consideration the signal directions increase estimation interference temperature, that is, reduce the frequency utilizing chance...
In this paper a new technique is proposed for time-domain detection in energy detection. The proposed scheme is based on a independent-component analysis (ICA): blind separation of unknown source signals. This method not only improves the nicety of time-domain detection for narrow band signal and the sinusoidal signal but also reduces the power of the whole detection system.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.