Efficient Spectrum Sensing for Cognitive Radio Networks via Joint Optimization of Sensing Threshold and Duration using MATLAB/SIMULINK
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 8
Abstract
Frequency band is valuable in communication media. Different Telecommunication regularity authority have the rights to assign the spectrum to the users and the policy to assign spectrum till date is static frequency allocation policy due to such policies scarcity of the spectrum present. It is required to implement the dynamic frequency allocation techniques (DSS) to improve the spectrum usage. There are different techniques for spectrum sensing like energy detection, matched filter, cyclostationary, compressive, cooperative etc. Every method has its loops and holes, Energy detection method is useful and very simple method for spectrum sensing. In energy detection method output of energy detector compares with predefined threshold valueIn this implementation analysis like different other parameters like ROC, probability of detection (Pd), False alarm probability (FAP), Power spectral density (PSD). The simulation results shows that use of DSS avoids the wastage of bandwidth, probability of false alarm can be attained as well as receiver operating characteristic can be monitored, the simulation results are verified
Authors and Affiliations
Kiran. A. Kanade
Paper on Basics of Internet of Things
The term Internet of Things generally refers to scenarios where network connectivity and computing capability extends to objects, sensors and everyday items not normally considered computers, allowing these devices to ge...
An Efficient Dynamic TESLA based Authentication Scheme for Secure Network Coding
Network coding based applications are notoriously susceptible to malicious pollution attacks. Packets authentication schemes have been well-recognized as the most effective approach to address this security threat. Howev...
Malicious Agent Detection In Multi Party Data Access Structure
A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some amount of data is leaked and found in an unauthorized machines (e.g., on the internet or computer). The distributor...
Trust-Based Malicious Node Detection and Routing in Wireless Sensor Networks
Wireless Sensor Networks (WSN) have arisen as a significant innovative area in wireless technology. In the nearby future, WSN are projected to comprise of thousands of sensor nodes, each having sensing proficiency with r...
Homomorphisms on S-Valued Graphs
Let be a simple graph with vertices and edges. In [6], we introduced the notion of valued graph where stands for the semiring. In this paper, we study the concept of homomorphism and isomorphism between two valued grap...