scholarly journals Remote Sensing Using Hybrid Access Cognitive Femtocell Networks in Wireless Communication

Femto cells are miniature wireless telecommunications base stations that can be placed in different inhibited or industry surroundings moreover as single stand-alone substance or in clusters to afford enhanced cellular coverage inside a building. It is extensively known that cellular coverage, predominantly for data transmission where high quality signal strengths are desirable is not as superior within buildings. By using a miniature domestic base station Femto cell, the cellular routine can be enhanced beside with the promising provision of other services. A cognitive radio network time after time detects handy channels in cellular spectrum, and then frequently varies its transmission or receiving parameters to tolerate further synchronized cellular communications in a given cellular electromagnetic band. Conveying of the free channels among main and minor users, in a specific geographic province at the same time as minimizing infringement amongst all users also known as the Spectrum allotment in cognitive radio networks. In this work MBS, FAP and MUs are presented. Here FAP serves the provision of sub channels and provides power in order to maximize the network effectiveness. Finally achieved maximum throughput for the deployed Macro users (MU) and also the above mentioned problem is solved by dual disintegration method.

Cognitive Radio (CR) is a technology that promises to solve the data transmission problem by allowing secondary users to coexist with primary user without causing any interference to the communication. It means to improve the usage of the radio assets to improve the throughput. Despite the fact that the operational parts of CR are being investigated broadly, its security viewpoints have increased little consideration. In this work, present a CRN architecture , Different Protocol, with complete rundown of major known security dangers and assaults inside a Cognitive Radio Network (CRN). Our goal in this paper is to dissect the distinctive security issues of the primary ongoing advancements of Cognitive Radio Networks with proper resource allocation to improve the throughput.


Author(s):  
Asif Raza ◽  
Muhammad Tanveer Meeran ◽  
Muizzud din

Today data transmission is very important through different channels. Need of network security comes to secure data transformation from one network to another network. As the complexity of the systems and the networks increases, weakness expands and the task of securing the networks is becomes more convoluted. Duty of securing is done by Cryptography techniques. A colossal amount of data is exchanged over public networks like the internet due to immense accommodation. This includes personal details and confidential information. It is important to prevent the data from falling into the wrong hands. So, due to this factor we use cryptography. Encryption and decryption are the basic terms that are used in cryptography. There are few algorithms which used including, AES (Advanced Encryption Standard), DES (Data Encryption Standard), 3DES (Triple Data Encryption Standard) and BLOWFISH. The main contribution of this paper is to provide an algorithm that is useful for data transformation in cognitive radio networks. In this research, we have drawn a new symmetric key technique that is for the usage of cryptography which is helpful to make the data saved from others.


2014 ◽  
Vol 631-632 ◽  
pp. 874-877
Author(s):  
Jie Guo ◽  
Yan Gu ◽  
Da Hai Jing

Spectrum sensing is a new technology in cognitive radio network, whose main purpose is to design an optimal detector. This paper studies a soft linear cooperative spectrum sensing method. We propose a SNR-based algorithm for weight setting at fusion center to improve the detector performance. Simulation results shows that the SNR-based method has better detector performance than the others.


2019 ◽  
Vol 10 (1) ◽  
pp. 1-18
Author(s):  
Prince Semba Yawada ◽  
Mesmin J. Mbyamm Kiki ◽  
Mai Trung Dong

The effective design of a cognitive radio network must take into account economic and technical aspects. This article presents a commercial formulation of the spectrum by the primary operators who decide to sell a part of their spectrum to a group of cognitive users in order to earn money and to promote the efficient use of the spectrum. Three systems of spectrum pricing are compared and suggested, such as the cooperative price based on the optimization of the profits, the market equilibrium, and the competitive prices focused on the competition of Bertrand. The Bertrand model examines the influences of certain parameters of the system such as the quality of the channel based on the Nash equilibrium and the substitutability of the spectrum. The differences in the various aspects of these systems of pricing are presented through the graphs. The authors note through the obtained result that the profit of the primary operator depends not only on the demand quantity of the spectrum but also on the behavior of the primary operators.


Information ◽  
2020 ◽  
Vol 11 (11) ◽  
pp. 500
Author(s):  
Kun Tang ◽  
Shaowei Liao

In this paper, we investigate a relay-assisted cooperative spectrum sharing for the considered non-orthogonal multiple access (NOMA) scheme in cognitive radio networks, where the relay node assists the base station (BS) to transmit the superimposed composite signal to two receivers by utilizing an amplified-and-forward (AF) technique with simultaneous wireless information and power transfer (SWIPT). The exact expressions for outage probabilities of two receivers are derived in closed forms. Moreover, a joint optimization of power allocation and the proportion of information splitting for energy harvesting is proposed in terms of energy efficiency (EE) maximization under required data reliability. Simulation results validate the analytical results since the analytical results match well with simulation results and demonstrate the performance advantages of the proposed scheme over other schemes and direct transmission.


Sign in / Sign up

Export Citation Format

Share Document