Opportunistic Channel Access Algorithm Based on Hidden Semi Markov Model for Cognitive Radio Networks
Journal Title: Bonfring International Journal of Research in Communication Engineering - Year 2014, Vol 4, Issue 2
Abstract
Future generation cellular networks highly depend on Cognitive radio due to its capability to handle the primary user channel utilization. However, channel sensing and allocation for secondary user are the major factors to be considered. Several research works have been carried out to deal with the sensing problem. But, most of the existing algorithms results in high computational complexity in real time implementation. In recent years, Hidden Markov Model(HMM) has been considered as a powerful statistical tool for modeling generative sequences that can be characterised by an underlying process generating an observable sequence algorithms. Thus, based on the motivation of the earlier works carried out in HMM, this paper proposed a probability based channel sensing algorithm. Hidden markov model is used for probability calculation of primary user state and the predicted channel is validated using the proposed quality estimation method. The performance metrics used to evaluate the proposed algorithm is linear mean square error value and the channel is estimated using different estimators. The comparison of the proposed algorithm with the existing algorithms and performance of the proposed algorithm is better than the other algorithms
Authors and Affiliations
B. Senthil Kumar , Dr. S. K. Srivatsa
Design and Development of Gaussian Minimum Shift Keying (GMSK) Demodulator for Satellite Communication
This paper discusses DSP based implementation of Gaussian Minimum Shift Keying (GMSK) demodulator using Polarity type Costas loop. The demodulator consists of a Polarity type Costas loop for carrier recovery, data recove...
An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption
Cloud computing is a technology which allows the users to share the data and the applications over the internet. An efficient sharing of secure cloud storage services (ESC) scheme allows the users to share the messages i...
V-parameter Study of Silica-Air 1D Photonic Crystal Fiber by Modulating Geometrical Parameters at Different Optical Communication Ranges
Electromagnetic wave propagation inside one-dimensional photonic crystal fiber is numerically characterized by computing V-parameter, cladding index and effective mode profiles. Dependence on these parameters on geometri...
Hybrid Fuzzy Based Intrusion Detection System for Wireless Local Area Networks (HFIDS)
The drawback of the anomaly based intrusion detection in a wireless network is the high rate of false positive. By designing a hybrid intrusion detection system can solve this by connecting a misuse detection module to t...
An Improved MAC Address Based Intrusion Detection and Prevention System in MANET Sybil Attacks
A Mobile Adhoc Network is a communication medium that does not rely on secure infrastructure .It is a group of independent mobile nodes that can transfer to communicate each other via radio waves. These networks are full...