A Study of Cognitive Radio based on WARP Platform
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 3
Abstract
Cognitive Radios (CR) are wireless transceivers that have the intelligence to sense the medium and detect whether a channel is occupied or free. If occupied, the CR modifies its own parameters and moves to a free channel. This feature of Cognitive Radio helps to efficiently use available frequencies of the Spectrum thereby efficiently utilizing the spectrum. An extensively used platform for conducting research in this field is the Wireless Open-Access Research Platform (WARP) developed by RICE university. This report introduces the WARP framework for cognitive radio networks, documents the attempt to implement Channel sensing and spectrum sensing using WARP and presents the results obtained during the experiments.
Authors and Affiliations
Navreet Kaur
Stepping Towards Component-Based Software Testing Through A Contemporary Layout
Component- based software development is aimed for developing new software speedily by using minimum resources but outcome the maximum worth. Various components are integrated all together to form the successful software...
TECHNIQUES TO PRESERVE DATA ACCESS PRIVACY OF USERS IN WSN :A SURVEY
Sensor nodes in wireless sensor network are densely deployed to monitor the physical world. In distributed access control user can directly access data from sensor nodes. While accessing data from sensor nodes user detai...
Performance Investigation on Lossy Still Image wavelet Compression using different wavelet filter functions
The aim of this paper is to observe a set of wavelet for achievement in a still image compression system and to accentuate the advantage of this transform involving to today’s methods. This paper discusses significant fe...
DETECTING AND BLOCKING OF SPAM ZOMBIE MECHANISM
A zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of...
Comparative study about Digital Image Watermarking Using DCT and robustness testing of technique
In the today’s world of rapidly growing internet services (Commercial and educational), security always comes in picture even at low level. Same way in the field of Information Technology and Computer Science and Enginee...