Search
Now showing items 41-48 of 48
Maximum throughput of a cooperative energy harvesting cognitive radio user
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, we investigate the maximum throughput of a saturated rechargeable secondary user (SU) sharing the spectrum with a primary user (PU). The SU harvests energy packets (tokens) from the environment with a certain ...
Multi-user diversity with optimal power allocation in spectrum sharing under average interference power constraint
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, we investigate the performance of multi-user diversity (MUD) with optimal power allocation (OPA) in spectrum sharing (SS) under average interference power (AIP) constraint. In particular, OPA through average ...
Protocol design and stability analysis of cooperative cognitive radio users
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
A single cognitive radio transmitter-receiver pair shares the spectrum with two primary users communicating with their respective receivers. Each primary user has a local traffic queue, whereas the cognitive user has three ...
Maximum throughput of a secondary user cooperating with an energy-aware primary user
(
IEEE Computer Society
, 2014 , Conference Paper)
This paper proposes a cooperation protocol between a secondary user (SU) and a primary user (PU) which dedicates a free frequency subband for the SU if cooperation results in energy saving. Time is slotted and users are ...
Probabilistic band-splitting for a buffered cooperative cognitive terminal
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, we propose a cognitive protocol that involves cooperation between the primary and secondary users. In addition to its own queue, the secondary user (SU) has a queue to store, and then relay, the undelivered ...
Forced spectrum access termination probability analysis under restricted channel handoff
(2012 , Conference Paper)
Most existing works on cognitive radio networks assume that cognitive (or secondary) users are capable of switching/jumping to any available channel, regardless of the frequency gap between the target and the current ...
Detecting the greedy spectrum occupancy threat in cognitive radio networks
(
IEEE Computer Society
, 2014 , Conference Paper)
Recently, security of cognitive radio (CR) is becoming a severe issue. There is one kind of threat, which we call greedy spectrum occupancy threat (GSOT) in this paper, has long been ignored in previous work. In GSOT, a ...
Cooperative access schemes for efficient SWIPT transmissions in cognitive radio networks
(
IEEE
, 2015 , Conference Paper)
We investigate joint information and energy cooperative schemes in a slotted-time cognitive radio network with a primary transmitter-receiver pair and a set of secondary transmitter-receiver pairs. The primary transmitter ...