Resource Allocation in Spectrum Deployment for Cognitive Third-party Users

被引:0
|
作者
Lakshmi, Arikatla Jaya [1 ]
Swamy, G. N. [2 ]
Prasad, M. N. Giri [1 ]
机构
[1] Jawaharlal Nehru Technol Univ, Dept ECE, Anantapur Ananthapuramu, Andhra Pradesh, India
[2] VR Siddhartha Engn Coll, Dept EIE, Vijayawada, Andhra Pradesh, India
关键词
Slot monitoring; spectrum sensing; primary user (PU); secondary user (SU); third-party spectrum utilization (TSU);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Spectrum scarcity is a major challenge in wireless communication for next generation applications. The spectrum sharing and utilization of other user available spectrum is an optimal solution, which has outcome with a new mode of communication called cognitive network. Cognitive devices are capable of requesting and sharing free spectrum among each other in a communication range. The spectrums are shared among primary and secondary user (PU, SU). To extend the range of spectrum utilization, users from other clusters are requested in sharing of spectrum which is called as third party user (TSU). In detection of free spectrum a jamming based approach is proposed in recent work. Jamming approach generates a periodic jamming signal for TSU in sensing of free spectrum. The repetitive requesting of spectrum availability result in large jamming probability for engaged TSU users resulting in large delay. In minimizing the delay observed, in this paper, a new monitored jamming approach is proposed. Proposed Monitored jamming approach is develop in recent to the engagement of each TSU for communication and governing the jamming signal based on the spectrum engagement. The proposed approach minimizes the delay due to jamming signaling in existing system. The Experimental results obtained shows an enhancement to the system throughput, fairness factor and minimizes the delay metric for proposed approach.
引用
收藏
页码:564 / 571
页数:8
相关论文
共 50 条
  • [21] THIRD-PARTY PROGRAMS
    BRYAN, RC
    [J]. JOURNAL OF THE AMERICAN PHARMACEUTICAL ASSOCIATION, 1971, NS11 (06): : 311 - &
  • [22] Third-party inspection
    Ackx, G
    [J]. MATERIALS PERFORMANCE, 1999, 38 (06) : 10 - 11
  • [23] Classification of Third-Party Applications on Facebook to Mitigate Users' Information Leakage
    Kavianpour, Sanaz
    Ismail, Zuraini
    Shanmugam, Bharanidharan
    [J]. RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2017, 569 : 144 - 154
  • [24] Users' Intention to Adopt Third-party Mobile Payment: An Empirical Study
    Li Yuxuan
    Yu Weiping
    Zuo Renshu
    [J]. NEW THINKING FOR STRATEGY: GREEN, INNOVATION AND SHARING, 2017, : 311 - 317
  • [25] Third-party Relationships and Third-party Protection in the European Property Law Regulations
    Mankowski, Peter
    [J]. RABELS ZEITSCHRIFT FUR AUSLANDISCHES UND INTERNATIONALES PRIVATRECHT, 2021, 85 (03): : 681 - 688
  • [26] Third-party purchase: An empirical study of third-party logistics providers in China
    Shi, Yangyan
    Zhang, Abraham
    Arthanari, Tiru
    Liu, Yanping
    Cheng, T. C. E.
    [J]. INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2016, 171 : 189 - 200
  • [27] An empirical study of third-party purchase: New Zealand users' perspective
    Shi, Yangyan
    Arthanari, Tiru
    Wood, Lincoln C.
    [J]. APPLIED ECONOMICS, 2016, 48 (56) : 5448 - 5461
  • [28] Third-party punishers are rewarded, but third-party helpers even more so
    Raihani, Nichola J.
    Bshary, Redouan
    [J]. EVOLUTION, 2015, 69 (04) : 993 - 1003
  • [29] Third-party multitransfer for the efficient distribution and deployment of high volume data in the grid
    Kim, E
    Park, H
    Lee, S
    Chung, JW
    [J]. PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2003, : 315 - 320
  • [30] THE THIRD-PARTY DOCTRINE AND THE THIRD PERSON
    Stern, Simon
    [J]. NEW CRIMINAL LAW REVIEW, 2013, 16 (03): : 364 - 412