Professional Documents
Culture Documents
• Severe fading over the distant end primary will leads much loss of bits
on the primary receiver so the primary user should take a decision
would leads efficient secondary network sensing and connection
capacity over the particular user.
• Already done technique would leads abrupt spectrum releasing and
continue over the other spectrum sensing is done over the network
provided in it to new network as a secondary user
Proposed Method:
• Location-Aware relay based Resource Allocation
Block Diagram:
Fig 1: location awareness sensing system
Cognitive Radio
Cognitive radio (CR) has been distinguished as a transforming
technology which holds the promise of advancing green communications. By
allowing secondary users (SUs) to borrow unused spectrum from primary
licensed networks, CR introduces an intelligent system, which can
opportunistically select the network and transmission parameters to improve
the radio spectrum efficiency. Spectrum sensing is the primary technique
employed by the CR system to detect the availability of licensed spectrum
and protect the primary system from being harmfully interfered. Depending
on spectrum policies laid by the primary system, the power strategies for CR
system can be classified as either overlay-based where the SUs can utilize the
spectrum only when the primary user (PU) is absent or underlay-based where
the SUs are allowed to share the spectrum with the PU.
Advantages:
• Spectrum sensing can be done over the network based on a relay leads
to high data transmission rate over the user allocated
• Lowers the spectrum sensing time over the network provided in
sensing
• User will be able to transmit the data without any eavesdropper’s
attack under the network it is available in the sensing area
Applications:
• [1] M. Lazarus, “The Great Spectrum Famine,” IEEE Spectr., vol. 47, no. 10, pp.
26-31, Oct. 2010.
• [2] FCC, ”Spectrum Policy Task Force Report,” ET Docker 02-155, Nov. 2002.
• [3] X. Wang, “Joint sensing-channel selection and power control for cognitive
radios,” IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 958-967, Mar. 2011.
• [4] S. Hu, Y. D. Yao, and Z. Yang, “MAC protocol identification using support
vector machines for cognitive radio networks,” IEEE WirelessCommun. Mag.,
vol. 21, no. 1, pp. 52-60, Feb. 2014.
• [5] C. K. Yu, K. C. Chen, and S. M. Cheng, “Cognitive radio network
tomography,” IEEE Trans. Vehicular Tech., vol. 59, May 2010.
• [6] H. Urkowitz, “Energy detection of unknown deterministic signals,” IEEE
Proc., vol. 55, no. 4, pp. 523-531, Apr. 1967.