In order to reduce the disturbance on an authorizing user and lower the competition between cognitive users, assure the normal communication of a cognitive radio system, reliability theory is applied to describe if a ...In order to reduce the disturbance on an authorizing user and lower the competition between cognitive users, assure the normal communication of a cognitive radio system, reliability theory is applied to describe if a channel can be used by a cognitive user or not and the probability that the channel is continually used for a period. Three aspects including space, time domain and frequency domain are united for the research on the distribution of frequency spectrum. The simulation result shows that, in the space domain, time domain, frequency domain algorithm, the transmitted data volume and the total throughput of the system are superior to those in greedy algorithm and time domain—frequency domain algorithm, the novel algorithm is helpful to reduce the disturbance caused by a cognitive user to an authorizing user and lower the competition between cognitive users, this simulation result shows that the proposed algorithm is effective.展开更多
基金supported by Natural Science Foundation of Heilongjiang Province of China(No.F2015017)
文摘In order to reduce the disturbance on an authorizing user and lower the competition between cognitive users, assure the normal communication of a cognitive radio system, reliability theory is applied to describe if a channel can be used by a cognitive user or not and the probability that the channel is continually used for a period. Three aspects including space, time domain and frequency domain are united for the research on the distribution of frequency spectrum. The simulation result shows that, in the space domain, time domain, frequency domain algorithm, the transmitted data volume and the total throughput of the system are superior to those in greedy algorithm and time domain—frequency domain algorithm, the novel algorithm is helpful to reduce the disturbance caused by a cognitive user to an authorizing user and lower the competition between cognitive users, this simulation result shows that the proposed algorithm is effective.