Spectrum sensing Techniques In Cognitive Radio
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 1, Issue 8
Abstract
The growing insist of wireless applications has put a lot of constraint on the usage of available radio spectrum which is limited and valuable resource. However, a fixed spectrum assignment has lead to under utilization of spectrum as a great segment of licensed spectrum is not effectively utilized. Cognitive radio is a promising technology which provides a novel way to improve utilizati helps to detect the spectrum holes (underutilized bands of the spectrum) providing high spectral resolution capability. In this paper, analysis of spectrum sensing techniques is obtainab in implementation of spectrum sensing techniques are discussed in detail giving comparative study of diverse methodologies.
Authors and Affiliations
Neeraj
To Compare the Pulse Performance value on Multi User DS-CDMA System
In this proposed work we analyze the performance of different type of pulse shaping filters on the performance of DS-CDMA System using spreading sequences. We evaluate and compare the BER performance value of dif...
Renewable Energy: Survey
Every step in human life the electricity become necessary needs. Electricity can be generated from fired stations using coal, electromechanical generators using fuel, natural gas etc. But due to the shortage of th...
INTEGRATED BIM AND DES FRAMEWORK FOR EFFECTIVE TIME AND COST MANAGEMENT OF SLIPFORM OPERATIONS
Effective management of Slipforming operations is critical due to operation’s linearity that is considered a source of planning and proper cost management complications. This paper is presented to assist practitio...
Design of Self-tuning PID controller using Fuzzy Logic for Level Process
In this paper a self-tuning PID controller is designed using fuzzy logic for a liquid level process of single tank and two tank systems. Conventional technique like Ziegler’s Nichols method can be enhanced using f...
Implementation on Distributed Network Services Using SSO for Secure Mechanism
Key Agreement and User Authentication is an prime issues for creating and maintaining a security in distributed network .Legal User may able to access services of different providers. Recently there are some user...