The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Machine learning based approaches for spectrum sensing and spectrum occupancy prediction in cognitive radio applications appear to have attracted sufficient interest in the current literature. In this paper, K-mean clustering based unsupervised learning method has been adopted for the performance enhancement of cooperative spectrum sensing in generalized к-μ fading channels. Extensive simulation has...
In cognitive radio (CR) networks, secondary users (SUs) detect and share a spectrum band assigned to a primary user (PU) to communicate with their respective secondary receivers. In order to increase the reliability of the detection performance, the SUs cooperatively sense the spectrum by reporting their local information to a fusion center (FC) after quantization. For an accurate information transferring,...
Cognitive Radio (CR) sensing has been widely considered as a spectrum scanning mechanism that allows secondary users (SUs) or cognitive radio users to use detected spectrum holes caused by primary user (PU) absence. Hard decision combining (HDC) schemes are proposed to combine the sensing decisions of the collaborated users to come out with a global binary decision on the presence or absence PUs....
This article considers a model of cooperative spectrum sharing between primary and secondary systems in which transmission occurs in two phases. In this scheme, we introduce that a single secondary transmitter, ST, employs a quadrature-phase-based signal to present the secondary message, while the primary message is presented by an in-phase-based signal. This allows simultaneous spectrum sharing without...
In this paper, we design, implement, and evaluate 802.11ec (Encoded Control), an 802.11-based protocol without control messages: Instead, 802.11ec employs correlatable symbol sequences that, together with the timing the codes are transmitted, encode all control information and change the fundamental design properties of the MAC. The use of correlatable symbol sequences provides two key advantages:...
We study the secrecy capacity of the Gaussian wiretap channel with binary input under either soft or hard decision decoding. A closed-form expression of the secrecy capacity is derived by assuming that the eavesdropper uses the same decoding method as the legitimate receiver. An upper bound of the loss of secrecy capacity is provided whilst a smart eavesdropper choosing the best decoding method and...
Detection and error rate performance of weak M-ary chirp spread-spectrum (MCSS) signals in Middleton's class-A noise are addressed. The structure of the optimal weak-signal receiver is derived and consists of a zero-memory nonlinearity (ZMNL), a function of first-order noise density, followed by Gaussian MCSS correlator receiver. Bit error rate (BER) bounds on the performance of this receiver are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.