Power and Contention Control Scheme: As a Good Candidate for Interference Modeling in Cognitive Radio Network
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 10
Abstract
Due to the ever growing need for spectrum, the cognitive radio (CR) has been proposed to improve the radio spectrum utilization. In this scenario, the secondary users (SU) are permitted to share spectrum with the licensed primary users (SU) with a strict condition that they do not cause harmful interference to the cognitive network. In this work, we have proposed an interference model for cognitive radio network that utilizes power or contention control interference management schemes. We derived the probability density function (PDF) with the power control scheme, where the power of transmission of the CR transmitter is guided by the power control law and also with contention control scheme that has a fixed transmission power for all CR transmitter controlled by a contention control protocol. This protocol makes a decision on which CR transmitter can transmit at any point in time. In this work, we have shown that power and contention control schemes are good candidates for interference modeling in cognitive radio system. The impact of the unknown location of the primary receiver on the resulting interference generated by the CR transmitters was investigated and the results shows that the challenges of the hidden primary receivers lead to higher CR-primary interference in respect to higher mean and variance. Finally, the presented results show power control and the contention control scheme are good candidates in reducing the interference generated by the cognitive radio network.
Authors and Affiliations
Ireyuwa Igbinosa, Olutayo Oyerinde, Viranjay Srivastava, Stanley Mneney
GIS Utilization for Delivering a Time Condition Products
As population is increasing rapidly all over the world, the need for delivering products is being more difficult especially for conditional products (products with life time). Many Customers require conditional products...
Network Attack Classification and Recognition Using HMM and Improved Evidence Theory
In this paper, a decision model of fusion classification based on HMM-DS is proposed, and the training and recognition methods of the model are given. As the pure HMM classifier can’t have an ideal balance between each m...
A Review of Blockchain based Educational Projects
Blockchain is a decentralized and shared dis-tributed ledger that records the transaction history done by totally different nodes within the whole network. The technology is practically used in the field of education for...
An Overview of Surface Tracking and Representation in Fluid Simulation
Realism in fluid animation can be achieve with physics based techniques and is the best among other approaches. Now, this area constitutes hot researches. There are number of mechanisms evolved with the advent of both ha...
Protection of Ultrasound Image Sequence: Employing Motion Vector Reversible Watermarking
In healthcare information systems, medical data is very important for diagnosis. Most of the health institutions store their patients’ data on third-party servers. Therefore, its security is very important, since the adv...