期刊文献+
共找到79篇文章
< 1 2 4 >
每页显示 20 50 100
Downlink Resource Allocation for NOMA-Based Hybrid Spectrum Access in Cognitive Network 被引量:1
1
作者 Yong Zhang Zhenjie Cheng +3 位作者 Da Guo Siyu Yuan Tengteng Ma Zhenyu Zhang 《China Communications》 SCIE CSCD 2023年第9期171-184,共14页
To solve the contradiction between limited spectrum resources and increasing communication demand,this paper proposes a wireless resource allocation scheme based on the Deep Q Network(DQN)to allocate radio resources i... To solve the contradiction between limited spectrum resources and increasing communication demand,this paper proposes a wireless resource allocation scheme based on the Deep Q Network(DQN)to allocate radio resources in a downlink multi-user cognitive radio(CR)network with slicing.Secondary users(SUs)are multiplexed using non-orthogonal multiple access(NOMA).The SUs use the hybrid spectrum access mode to improve the spectral efficiency(SE).Considering the demand for multiple services,the enhanced mobile broadband(eMBB)slice and ultrareliable low-latency communication(URLLC)slice were established.The proposed scheme can maximize the SE while ensuring Quality of Service(QoS)for the users.This study established a mapping relationship between resource allocation and the DQN algorithm in the CR-NOMA network.According to the signal-to-interference-plusnoise ratio(SINR)of the primary users(PUs),the proposed scheme can output the optimal channel selection and power allocation.The simulation results reveal that the proposed scheme can converge faster and obtain higher rewards compared with the Q-Learning scheme.Additionally,the proposed scheme has better SE than both the overlay and underlay only modes. 展开更多
关键词 cognitive network network slicing non-orthogonal multiple access hybrid spectrum access resource allocation deep reinforcement learning
下载PDF
A CHANNEL ASSIGNMENT ALGORITHM VIA CONFLICT SHIFTING FOR DISTRIBUTED COGNITIVE NETWORKS
2
作者 Gong Minkang Ren Pinyi 《Journal of Electronics(China)》 2010年第5期647-654,共8页
Channel assignment is a challenge for distributed cognitive networks due to spectrum mobility and lack of centralized entity.We present a dynamic and efficient algorithm via conflict shifting,referred as Shifting-base... Channel assignment is a challenge for distributed cognitive networks due to spectrum mobility and lack of centralized entity.We present a dynamic and efficient algorithm via conflict shifting,referred as Shifting-based Channel Assignment(SCA).In this algorithm,the system was modeled with a conflict graph,and users cannot assign the channels that primary users(legacy users) and neighbors already occupied.In order to eliminate the conflicts between neighbors efficiently,secondary users(unlicensed users) try to transfer them through a straight path to the boundary,where conflicts are easier to solve as there are less neighbors for boundary users.Actions in one shift are executed in slots,and users act in a synchronous and separated manner.As a result,some of the conflicting channels are avoid from directly abandoned,and for this,utility of the entire network can be improved.Simulation results show that the proposed algorithm can provide similar utility performance while obviously reducing the communication cost than bargaining-base algorithms.In small scale networks with low user mobility(under 20%),it reduces 50% of the communication overhead than the later. 展开更多
关键词 Distributed cognitive network channel assignment Shifting-based Channel Assignment (SCA)
下载PDF
Self-Adaptive QoS Control in Cognitive Networks That Is Based on Service Awareness
3
作者 Chengjie Gu Shunyi Zhang Yanfei Sun 《ZTE Communications》 2011年第2期44-48,共5页
This paper analyzes a self-adaptive Quality of Service (QoS) control architecture for cognitive networks (CNs) that is based on intelligent service awareness. In this architecture, packets can be identified and cl... This paper analyzes a self-adaptive Quality of Service (QoS) control architecture for cognitive networks (CNs) that is based on intelligent service awareness. In this architecture, packets can be identified and classified using an intelligent service-aware classification model. Drawing on Control Theory, network traffic can be controlled with a self-adaptive QoS control mechanism that has side-road collaboration. In this architecture, perception, analysis, correlation, feedback, decision making, allocation, and implementation QoS mechanisms are created automatically. These mechanisms can adjust resource allocation, adapt to a changeable network environment, optimize end-to-end performance of the network, and ensure QoS. 展开更多
关键词 cognitive network service-awareness self-adaptive control QOS
下载PDF
Modified Black Widow Optimization-Based Enhanced Threshold Energy Detection Technique for Spectrum Sensing in Cognitive Radio Networks
4
作者 R.Saravanan R.Muthaiah A.Rajesh 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2339-2356,共18页
This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the second... This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the secondary user based on the square law.The proposed method is implemented with the signal transmission of multiple outputs-orthogonal frequency division multiplexing.Additionally,the proposed method is considered the dynamic detection threshold adjustments and energy identification spectrum sensing technique in cognitive radio systems.In the dynamic threshold,the signal ratio-based threshold is fixed.The threshold is computed by considering the Modified Black Widow Optimization Algorithm(MBWO).So,the proposed methodology is a combination of dynamic threshold detection and MBWO.The general threshold-based detection technique has different limitations such as the inability optimal signal threshold for determining the presence of the primary user signal.These limitations undermine the sensing accuracy of the energy identification technique.Hence,the ETBED technique is developed to enhance the energy efficiency of cognitive radio networks.The projected approach is executed and analyzed with performance and comparison analysis.The proposed method is contrasted with the conventional techniques of theWhale Optimization Algorithm(WOA)and GreyWolf Optimization(GWO).It indicated superior results,achieving a high average throughput of 2.2 Mbps and an energy efficiency of 3.8,outperforming conventional techniques. 展开更多
关键词 cognitive radio network spectrum sensing noise uncertainty modified black widow optimization algorithm energy detection technique
下载PDF
Optimization of Cognitive Femtocell Network via Oppositional Beetle Swarm Optimization Algorithm
5
作者 K.Rajesh Kumar M.Vijayakumar 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期819-832,共14页
In past decades,cellular networks have raised the usage of spectrum resources due to the victory of mobile broadband services.Mobile devices create massive data than ever before,facing the way cellular networks are in... In past decades,cellular networks have raised the usage of spectrum resources due to the victory of mobile broadband services.Mobile devices create massive data than ever before,facing the way cellular networks are installed pre-sently for satisfying the increased traffic requirements.The development of a new exclusive spectrum offered to meet up the traffic requirements is challenging as spectrum resources are limited,hence costly.Cognitive radio technology is pre-sented to increase the pool of existing spectrum resources for mobile users via Femtocells,placed on the top of the available macrocell network for sharing the same spectrum.Nevertheless,the concurrent reuse of spectrum resources from Femto networks poses destructive interference on macro networks.To resolve this issue,this paper introduces an optimal channel allocation model using the Oppo-sitional Beetle Swarm Optimization Algorithm(OBSOA)to allocate the channel with interference avoidance.A new OBSOA is derived in this paper by the inclu-sion of opposition-based learning(OBL)in BSOA.This algorithm allocates the channels used by PUs(PUs)to the secondary users(SUs)in such a way that inter-ference is minimized.This proposed approach is implemented in the MATrix LABoratory(MATLAB)platform.The performance of this proposed approach is evaluated in terms of several measures and the experimental outcome verified the superior nature of the OBSOA-based channel allocation model.OBSOA mod-el has resulted in a maximum signal-to-interference-plus-noise ratio value of 86.42 dB. 展开更多
关键词 Femto networks channel allocation spectrum reuse cognitive network
下载PDF
Secrecy Rate Maximization for 6G Cognitive Satellite-UAV Networks 被引量:1
6
作者 Chengleyang Lei Wei Feng +1 位作者 Yunfei Chen Ning Ge 《China Communications》 SCIE CSCD 2023年第1期246-260,共15页
To cover remote areas where terrestrial cellular networks may not be available,non-terrestrial infrastructures such as satellites and unmanned aerial vehicles(UAVs)can be utilized in the upcoming sixth-generation(6G)e... To cover remote areas where terrestrial cellular networks may not be available,non-terrestrial infrastructures such as satellites and unmanned aerial vehicles(UAVs)can be utilized in the upcoming sixth-generation(6G)era.Considering the spectrum scarcity problem,satellites and UAVs need to share the spectrum to save costs,leading to a cognitive satellite-UAV network.Due to the openness of both satellite links and UAV links,communication security has become a major concern in cognitive satelliteUAV networks.In this paper,we safeguard a cognitive satellite-UAV network from a physical layer security(PLS)perspective.Using only the slowlyvarying large-scale channel state information(CSI),we jointly allocate the transmission power and subchannels to maximize the secrecy sum rate of UAV users.The optimization problem is a mixed integer nonlinear programming(MINLP)problem with coupling constraints.We propose a heuristic algorithm which relaxes the coupling constraints by the penalty method and obtains a sub-optimal low-complexity solution by utilizing random matrix theory,the max-min optimization tool,and the bipartite graph matching algorithm.The simulation results corroborate the superiority of our proposed scheme. 展开更多
关键词 channel allocation cognitive satellite-UAV network physical layer security power allocation
下载PDF
Secure Transmission in Cognitive Radio Networks Using Full-Duplex Technique with Outdated CSI
7
作者 Zhihui Shang Tao Zhang +2 位作者 Guojie Hu Yueming Cai Weiwei Yang 《China Communications》 SCIE CSCD 2023年第1期230-245,共16页
This paper investigates the effects of the outdated channel state information(CSI)on the secrecy performance of an underlay spectrum sharing cognitive radio networks(CRNs),where the secondary user(SU)source node(Alice... This paper investigates the effects of the outdated channel state information(CSI)on the secrecy performance of an underlay spectrum sharing cognitive radio networks(CRNs),where the secondary user(SU)source node(Alice)aims to transmit the trusted messages to the full-duplex(FD)aided SU receiver(Bob)with the assistance of cooperative relay(Relay).Considering the impact of feedback delay,outdated CSI will aggravate the system performance.To tackle such challenge,the collaborative zero-forcing beamforming(ZFB)scheme of FD technique is further introduced to implement jamming so as to confuse the eavesdropping and improve the security performance of the system.Under such setup,the exact and asymptotic expressions of the secrecy outage probability(SOP)under the outdated CSI case are derived,respectively.The results reveal that i)the outdated CSI of the SU transmission channel will decrease the diversity gain from min(NANR,NRNB)to NRwith NA,NRand NBbeing the number of antennas of Alice,Relay and Bob,respectively,ii)the introduction of FD technique can improve coding gain and enhance system performance. 展开更多
关键词 cognitive radio network physical layer security full-duplex multiple antennas relay secrecy outage probability outdated CSI
下载PDF
Dynamic channel estimation-aware routing protocol in mobile cognitive radio networks for smart IIoT applications
8
作者 Qusay M.Salih Md Arafatur Rahman +4 位作者 A.Taufiq Asyhari Muhammad Kamran Naeem Mohammad Patwary Ryan Alturki Mohammed Abdulaziz Ikram 《Digital Communications and Networks》 SCIE CSCD 2023年第2期367-382,共16页
Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)applications.In order to provide an efficient co... Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)applications.In order to provide an efficient connection among IIoT devices,CRNs enhance spectrum utilization by using licensed spectrum.However,the routing protocol in these networks is considered one of the main problems due to node mobility and time-variant channel selection.Specifically,the channel selection for routing protocol is indispensable in CRNs to provide an adequate adaptation to the Primary User(PU)activity and create a robust routing path.This study aims to construct a robust routing path by minimizing PU interference and routing delay to maximize throughput within the IIoT domain.Thus,a generic routing framework from a cross-layer perspective is investigated that intends to share the information resources by exploiting a recently proposed method,namely,Channel Availability Probability.Moreover,a novel cross-layer-oriented routing protocol is proposed by using a time-variant channel estimation technique.This protocol combines lower layer(Physical layer and Data Link layer)sensing that is derived from the channel estimation model.Also,it periodically updates and stores the routing table for optimal route decision-making.Moreover,in order to achieve higher throughput and lower delay,a new routing metric is presented.To evaluate the performance of the proposed protocol,network simulations have been conducted and also compared to the widely used routing protocols,as a benchmark.The simulation results of different routing scenarios demonstrate that our proposed solution outperforms the existing protocols in terms of the standard network performance metrics involving packet delivery ratio(with an improved margin of around 5–20%approximately)under varying numbers of PUs and cognitive users in Mobile Cognitive Radio Networks(MCRNs).Moreover,the cross-layer routing protocol successfully achieves high routing performance in finding a robust route,selecting the high channel stability,and reducing the probability of PU interference for continued communication. 展开更多
关键词 Channel selection Cross-layer design Mobile cognitive radio networks Routing protocol IIoT applications
下载PDF
Robust beamforming for IRS-aided SWIPT in cognitive radio networks
9
作者 Zining Wang Min Lin +3 位作者 Shupei Huang Ming Cheng Wei-Ping Zhu Yan Guo 《Digital Communications and Networks》 SCIE CSCD 2023年第3期645-654,共10页
Intelligent reflecting surface(IRS)is widely recognized as a promising technique to enhance the system perfor-mance,and thus is a hot research topic in future wireless communications.In this context,this paper propose... Intelligent reflecting surface(IRS)is widely recognized as a promising technique to enhance the system perfor-mance,and thus is a hot research topic in future wireless communications.In this context,this paper proposes a robust BF scheme to improve the spectrum and energy harvesting efficiencies for the IRS-aided simultaneous wireless information and power transfer(SWIPT)in a cognitive radio network(CRN).Here,the base station(BS)utilizes spectrum assigned to the primary users(PUs)to simultaneously serve multiple energy receivers(ERs)and information receivers(IRs)through IRS-aided multicast technology.In particular,by assuming that only the imperfect channel state information(CSI)is available,we first formulate a constrained problem to maximize the minimal achievable rate of IRs,while satisfying the harvesting energy threshold of ERs,the quality-of-service requirement of IRs,the interference threshold of PUs and transmit power budget of BS.To address the non-convex problem,we then adopt triangle inequality to deal with the channel uncertainty,and propose a low-complexity algorithm combining alternating direction method of multipliers(ADMM)with alternating optimi-zation(AO)to jointly optimize the active and passive beamformers for the BS and IRS,respectively.Finally,our simulation results confirm the effectiveness of the proposed BF scheme and also provide useful insights into the importance of introducing IRS into the CRN with SWIPT. 展开更多
关键词 cognitive radio networks Intelligent reflecting surface Simultaneous wireless information and power TRANSFER Robust beamforming
下载PDF
Intelligent Covert Communication Design for Cooperative Cognitive Radio Network
10
作者 Zan Li Jia Shi +3 位作者 Chao Wang Danyang Wang Xiaomeng Li Xiaomin Liao 《China Communications》 SCIE CSCD 2023年第7期122-136,共15页
Extensive research attentions have been devoted to studying cooperative cognitive radio networks(CCRNs),where secondary users(SU)providing cooperative transmissions can be permitted by primary users(PU)to use spectrum... Extensive research attentions have been devoted to studying cooperative cognitive radio networks(CCRNs),where secondary users(SU)providing cooperative transmissions can be permitted by primary users(PU)to use spectrum.In order to maximize SU’s utility,SU may transmit its own information during the period of cooperative transmission,which stimulates the use of covert transmission against PU’s monitoring.For this sake,this article reviews the motivations of studying covert communications in CCRN.In particular,three intelligent covert transmission approaches are developed for maximizing SU’s utility in CCRNs,namely,intelligent parasitic covert transmission(IPCT),intelligent jammer aided covert transmission(IJCT)and intelligent reflecting surface assisted covert transmission(IRSC).Further,some raw performance evaluations are discussed,and a range of potential research directions are also provided. 展开更多
关键词 cognitive radio networks covert transmis-sion machine learning
下载PDF
Modified Dwarf Mongoose Optimization Enabled Energy Aware Clustering Scheme for Cognitive Radio Wireless Sensor Networks
11
作者 Sami Saeed Binyamin Mahmoud Ragab 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期105-119,共15页
Cognitive radio wireless sensor networks(CRWSN)can be defined as a promising technology for developing bandwidth-limited applications.CRWSN is widely utilized by future Internet of Things(IoT)applications.Since a prom... Cognitive radio wireless sensor networks(CRWSN)can be defined as a promising technology for developing bandwidth-limited applications.CRWSN is widely utilized by future Internet of Things(IoT)applications.Since a promising technology,Cognitive Radio(CR)can be modelled to alleviate the spectrum scarcity issue.Generally,CRWSN has cognitive radioenabled sensor nodes(SNs),which are energy limited.Hierarchical clusterrelated techniques for overall network management can be suitable for the scalability and stability of the network.This paper focuses on designing the Modified Dwarf Mongoose Optimization Enabled Energy Aware Clustering(MDMO-EAC)Scheme for CRWSN.The MDMO-EAC technique mainly intends to group the nodes into clusters in the CRWSN.Besides,theMDMOEAC algorithm is based on the dwarf mongoose optimization(DMO)algorithm design with oppositional-based learning(OBL)concept for the clustering process,showing the novelty of the work.In addition,the presented MDMO-EAC algorithm computed a multi-objective function for improved network efficiency.The presented model is validated using a comprehensive range of experiments,and the outcomes were scrutinized in varying measures.The comparison study stated the improvements of the MDMO-EAC method over other recent approaches. 展开更多
关键词 cognitive radio wireless sensor networks CLUSTERING dwarf mongoose optimization algorithm fitness function
下载PDF
Research on Physical Layer Security in Cognitive Wireless Networks with Multiple Eavesdroppers Based on Resource Allocation Algorithm
12
作者 Yuxin Du Xiaoli He Yongming Huang 《Journal of Computer and Communications》 2023年第3期32-46,共15页
With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the syst... With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the system, which have been widely concerned in the field of wireless communication. However, due to the importance of ownership and privacy protection, the IoT system must provide corresponding security mechanisms. From the perspective of improving the transmission security of CR-NOMA system based on cognitive wireless network, and considering the shortcomings of traditional relay cooperative NOMA system, this paper mainly analyzes the eavesdropping channel model of multi-user CR-NOMA system and derives the expressions of system security and rate to improve the security performance of CR-NOMA system. The basic idea of DC planning algorithm and the scheme of sub-carrier power allocation to improve the transmission security of the system were introduced. An algorithm for DC-CR-NOMA was proposed to maximize the SSR of the system and minimize the energy loss. The simulation results show that under the same complexity, the security and speed of the system can be greatly improved compared with the traditional scheme. 展开更多
关键词 cognitive Radio networks Non-Orthogonal Multiple Access Physical Layer Security Sum of Safety Rates
下载PDF
Asynchronous Fuzzy Cognitive Networks Modeling and Control for Goethite Iron Precipitation Process 被引量:1
13
作者 CHEN Ning PENG Junjie +2 位作者 GUI Weihua ZHOU Jiaqi DAI Jiayang 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2020年第5期1422-1445,共24页
Goethite iron precipitation process is a key step in direct leaching process of zinc,whose aim is to remove ferrous ions from zinc sulphate solution.The process consists of several cascade reactors,and each of them co... Goethite iron precipitation process is a key step in direct leaching process of zinc,whose aim is to remove ferrous ions from zinc sulphate solution.The process consists of several cascade reactors,and each of them contains complex chemical reactions featured by strong nonlinearity and large time delay.Therefore,it is hard to build up an accurate mathematical model to describe the dynamic changes in the process.In this paper,by studying the mechanism of these reactions and combining historical data and expert experience,the modeling method called asynchronous fuzzy cognitive networks(AFCN)is proposed to solve the various time delay problem.Moreover,the corresponding AFCN model for goethite iron precipitation process is established.To control the process according to fuzzy rules,the nonlinear Hebbian learning algorithm(NHL)terminal constraints is firstly adopted for weights learning.Then the model parameters of equilibrium intervals corresponding to different operating conditions can be calculated.Finally,the matrix meeting the expected value and the weight value of steady states is stored into fuzzy rules as prior knowledge.The simulation shows that the AFCN model for goethite iron precipitation process could precisely describe the dynamic changes in the system,and verifies the superiority of control method based on fuzzy rules. 展开更多
关键词 Asynchronous fuzzy cognitive networks fuzzy rules database Goethite iron precipitation process Hebbian learning
原文传递
Joint Beamforming and Time Switching Designs for Energy-Constrained Cognitive Two-Way Relay Networks
14
作者 Meijuan Zhang Shibing Zhang +3 位作者 Zhihua Bao Wei Wang Xiaoge Zhang Yonghong Chen 《China Communications》 SCIE CSCD 2020年第5期110-118,共9页
In this paper, we investigate a joint beamforming and time switching(TS) design for an energy-constrained cognitive two-way relay(TWR) network. In the network, the energy-constrained secondary user(SU) relay employs T... In this paper, we investigate a joint beamforming and time switching(TS) design for an energy-constrained cognitive two-way relay(TWR) network. In the network, the energy-constrained secondary user(SU) relay employs TS protocol to harvest energy from the signals sent by the circuit-powered primary user(PU) transmitter, and then exploits the harvested energy to perform information forwarding. Our aim is to maximize the sum rate of SUs under the constraints of the data rate of PU, the energy harvesting and the transmit power of the SU relay. To determine the beamforming matrix and TS ratio, we decouple the original non-convex problem into two subproblems which can be solved by semidefinite relaxation and successive convex optimization methods. Furthermore, we derive closed form expressions of the optimal solutions for each subproblem, which facilitates the design of a suboptimal iterative algorithm to handle the original sum rate maximization problem. Simulation results are presented to illustrate the effectiveness and superior performance of the proposed joint design against other conventional schemes in the literature. 展开更多
关键词 cognitive networks two-way relay sum rate energy harvesting BEAMFORMING
下载PDF
Multi-user cognitive radio network resource allocation based on the adaptive niche immune genetic algorithm 被引量:4
15
作者 俎云霄 周杰 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第1期558-565,共8页
Multi-user cognitive radio network resource allocation based on the adaptive niche immune genetic algorithm is proposed, and a fitness function is provided. Simulations are conducted using the adaptive niche immune ge... Multi-user cognitive radio network resource allocation based on the adaptive niche immune genetic algorithm is proposed, and a fitness function is provided. Simulations are conducted using the adaptive niche immune genetic algo- rithm, the simulated annealing algorithm, the quantum genetic algorithm and the simple genetic algorithm, respectively. The results show that the adaptive niche immune genetic algorithm performs better than the other three algorithms in terms of the multi-user cognitive radio network resource allocation, and has quick convergence speed and strong global searching capability, which effectively reduces the system power consumption and bit error rate. 展开更多
关键词 cognitive radio networks niche genetic algorithm King map resource allocation
下载PDF
Power Control and Routing Selection for Throughput Maximization in Energy Harvesting Cognitive Radio Networks 被引量:2
16
作者 Xiaoli He Hong Jiang +1 位作者 Yu Song Muhammad Owais 《Computers, Materials & Continua》 SCIE EI 2020年第6期1273-1296,共24页
This paper investigates the power control and routing problem in the communication process of an energy harvesting(EH)multi-hop cognitive radio network(CRN).The secondary user(SU)nodes(i.e.,source node and relay nodes... This paper investigates the power control and routing problem in the communication process of an energy harvesting(EH)multi-hop cognitive radio network(CRN).The secondary user(SU)nodes(i.e.,source node and relay nodes)harvest energy from the environment and use the energy exclusively for transmitting data.The SU nodes(i.e.,relay nodes)on the path,store and forward the received data to the destination node.We consider a real world scenario where the EH-SU node has only local causal knowledge,i.e.,at any time,each EH-SU node only has knowledge of its own EH process,channel state and currently received data.In order to study the power and routing issues,an optimization problem that maximizes path throughput considering quality of service(QoS)and available energy constraints is proposed.To solve this optimization problem,we propose a hybrid game theory routing and power control algorithm(HGRPC).The EH-SU nodes on the same path cooperate with each other,but EH-SU nodes on the different paths compete with each other.By selecting the best next hop node,we find the best strategy that can maximize throughput.In addition,we have established four steps to achieve routing,i.e.,route discovery,route selection,route reply,and route maintenance.Compared with the direct transmission,HGRPC has advantages in longer distances and higher hop counts.The algorithm generates more energy,reduces energy consumption and increases predictable residual energy.In particular,the time complexity of HGRPC is analyzed and its convergence is proved.In simulation experiments,the performance(i.e.,throughput and bit error rate(BER))of HGRPC is evaluated.Finally,experimental results show that HGRPC has higher throughput,longer network life,less latency,and lower energy consumption. 展开更多
关键词 cognitive radio networks power control routing selection energy harvesting game theory amplify-and-forward(AF) THROUGHPUT
下载PDF
Automatic Classification of Superimposed Modulations for 5G MIMO Two-Way Cognitive Relay Networks 被引量:1
17
作者 Haithem Ben Chikha Ahmad Almadhor 《Computers, Materials & Continua》 SCIE EI 2022年第1期1799-1814,共16页
To promote reliable and secure communications in the cognitive radio network,the automatic modulation classification algorithms have been mainly proposed to estimate a single modulation.In this paper,we address the cl... To promote reliable and secure communications in the cognitive radio network,the automatic modulation classification algorithms have been mainly proposed to estimate a single modulation.In this paper,we address the classification of superimposed modulations dedicated to 5G multipleinput multiple-output(MIMO)two-way cognitive relay network in realistic channels modeled with Nakagami-m distribution.Our purpose consists of classifying pairs of users modulations from superimposed signals.To achieve this goal,we apply the higher-order statistics in conjunction with the Multi-BoostAB classifier.We use several efficiency metrics including the true positive(TP)rate,false positive(FP)rate,precision,recall,F-Measure and receiver operating characteristic(ROC)area in order to evaluate the performance of the proposed algorithm in terms of correct superimposed modulations classification.Computer simulations prove that our proposal allows obtaining a good probability of classification for ten superimposed modulations at a low signal-to-noise ratio,including the worst case(i.e.,m=0.5),where the fading distribution follows a one-sided Gaussian distribution.We also carry out a comparative study between our proposal usingMultiBoostAB classifier with the decision tree(J48)classifier.Simulation results show that the performance of MultiBoostAB on the superimposed modulations classifications outperforms the one of J48 classifier.In addition,we study the impact of the symbols number,path loss exponent and relay position on the performance of the proposed automatic classification superimposed modulations in terms of probability of correct classification. 展开更多
关键词 Automatic classification MIMO two-way cognitive relay network Nakagami-m channels superimposed modulations 5G
下载PDF
Cooperative Privacy Provisioning for Energy Harvesting Based Cognitive Multi-Relay Networks 被引量:1
18
作者 Dawei Wang Wei Liang +2 位作者 Xiaoyu Hu Daosen Zhai Di Zhang 《China Communications》 SCIE CSCD 2020年第2期125-137,共13页
In order to provide privacy provisioning for the secondary information,we propose an energy harvesting based secure transmission scheme for the cognitive multi-relay networks.In the proposed scheme,two secondary relay... In order to provide privacy provisioning for the secondary information,we propose an energy harvesting based secure transmission scheme for the cognitive multi-relay networks.In the proposed scheme,two secondary relays harvest energy to power the secondary transmitter and assist the secondary secure transmission without interfere the secondary transmission.Specifically,the proposed secure transmission policy is implemented into two phases.In the first phase,the secondary transmitter transmits the secrecy information and jamming signal through the power split method.After harvesting energy from a fraction of received radio-frequency signals,one secondary relay adopts the amplify-and-forward relay protocol to assist the secondary secure transmission and the other secondary relay just forwards the new designed jamming signal to protect the secondary privacy information and degrade the jamming interference at the secondary receiver.For the proposed scheme,we first analyze the average secrecy rate,the secondary secrecy outage probability,and the ergodic secrecy rate,and derive their closed-form expressions.Following the above results,we optimally allocate the transmission power such that the secrecy rate is maximized under the secrecy outage probability constraint.For the optimization problem,an AI based simulated annealing algorithm is proposed to allocate the transmit power.Numerical results are presented to validate the performance analytical results and show the performance superiority of the proposed scheme in terms of the average secrecy rate. 展开更多
关键词 cognitive radio networks energy harvesting RELAY security
下载PDF
Optimal spectrum allocation of primary users in light-handed cognitive radio networks 被引量:1
19
作者 司鹏博 孙恩昌 张延华 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第3期21-27,共7页
In traditional cognitive radio(CR) network,secondary users(SUs) are always assumed to obey the rule of"introducing no interference to the primary users(PUs) ".However,this assumption may be not realistic as ... In traditional cognitive radio(CR) network,secondary users(SUs) are always assumed to obey the rule of"introducing no interference to the primary users(PUs) ".However,this assumption may be not realistic as the CR devices becoming more and more intelligent nowadays.In this paper,with the concept of lighthanded CR,which is proposed to deal with the above mentioned problem by enforcing"punishment"to illegal CR transmissions,the action decisions of primary users(PUs) are modeled as a partially observable Markov decision process(POMDP),and the optimal spectrum allocation scheme with the objective of maximizing their reward is proposed,which is defined by the utility function.Furthermore,a reduced scheme with much smaller state space has been proposed in this paper for lower computational complexity.Extensive simulation results show that the proposed schemes improve the reward significantly compared to the existing scheme. 展开更多
关键词 cognitive radio networks light-handed CR optimal decision making POMDP
下载PDF
Combined spatial-temporal energy harvesting and relay selection for cognitive wireless powered networks 被引量:1
20
作者 Yuan Gao Haixia He +1 位作者 Rongjun Tan Junho Choi 《Digital Communications and Networks》 SCIE CSCD 2021年第2期201-213,共13页
In order to improve the Energy Efficiency(EE)and spectrum utilization of Cognitive Wireless Powered Networks(CWPNs),a combined spatial-temporal Energy Harvesting(EH)and relay selection scheme is proposed.In the propos... In order to improve the Energy Efficiency(EE)and spectrum utilization of Cognitive Wireless Powered Networks(CWPNs),a combined spatial-temporal Energy Harvesting(EH)and relay selection scheme is proposed.In the proposed scheme,for protecting the Primary User(PU),a two-layer guard zone is set outside the PU based on the outage probability threshold of the PU.Moreover,to increase the energy of the CWPNs,the EH zone in the two-layer guard zone allows the Secondary Users(SUs)to spatially harvest energy from the Radio Frequency(RF)signals of temporally active PUs.To improve the utilization of the PU spectrum,the guard zone outside the EH zone allows for the constrained power transmission of SUs.Moreover,the relay selection transmission is designed in the transmission zone of the SU to improve the EE of the CWPNs.In addition to the EE of the CWPNs,the outage probabilities of the SU and PU are derived.The results reveal that the setting of a two-layer guard zone can effectively reduce the outage probability of the PU and improve the EE of CWPNs.Furthermore,the relay selection transmission decreases the outage probabilities of the SUs. 展开更多
关键词 Spatial-temporal energy harvesting cognitive wireless powered networks Guard zone Outage probability Energy efficiency
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部