Power and Contention Control Scheme: As a Good Candidate for Interference Modeling in Cognitive Radio Network
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 10
Abstract
Due to the ever growing need for spectrum, the cognitive radio (CR) has been proposed to improve the radio spectrum utilization. In this scenario, the secondary users (SU) are permitted to share spectrum with the licensed primary users (SU) with a strict condition that they do not cause harmful interference to the cognitive network. In this work, we have proposed an interference model for cognitive radio network that utilizes power or contention control interference management schemes. We derived the probability density function (PDF) with the power control scheme, where the power of transmission of the CR transmitter is guided by the power control law and also with contention control scheme that has a fixed transmission power for all CR transmitter controlled by a contention control protocol. This protocol makes a decision on which CR transmitter can transmit at any point in time. In this work, we have shown that power and contention control schemes are good candidates for interference modeling in cognitive radio system. The impact of the unknown location of the primary receiver on the resulting interference generated by the CR transmitters was investigated and the results shows that the challenges of the hidden primary receivers lead to higher CR-primary interference in respect to higher mean and variance. Finally, the presented results show power control and the contention control scheme are good candidates in reducing the interference generated by the cognitive radio network.
Authors and Affiliations
Ireyuwa Igbinosa, Olutayo Oyerinde, Viranjay Srivastava, Stanley Mneney
OFDM System Analysis for reduction of Inter symbol Interference Using the AWGN Channel Platform
Orthogonal Frequency Division Multiplexing (OFDM) transmissions are emerging as important modulation technique because of its capacity of ensuring high level of robustness against any interferences. This proj...
Quantization Table Estimation in JPEG Images
Most digital image forgery detection techniques require the doubtful image to be uncompressed and in high quality. However, most image acquisition and editing tools use the JPEG standard for image compression. The histog...
A Learner Model for Adaptable e-Learning
The advancement in Information and Communication Technology (ICT) has provided new opportunities for teaching and learning in the form of e-learning. However, developing specialized contents, accommodating profiles of le...
Missing Data Imputation using Genetic Algorithm for Supervised Learning
Data is an important asset for any organization to successfully run its business. When we collect data, it contains data with low qualities such as noise, incomplete, missing values etc. If the quality of data is low the...
A Review on Scream Classification for Situation Understanding
: In our living environment, a non-speech audio signal provides a significant evidence for situation awareness. It also compliments the information obtained from a video signal. In non-speech audio signals, screaming is...