1. Introduction
To make better usage of the electromagnetic frequency spectrum, CR was first introduced in 1999 [1]. On the one hand, certain spectrum bands face overuse, which reduces their bandwidth availability, while on the other hand, remaining bands, such those allotted to TV channels, may suffer underuse, which wastes network resources [2]. For instance, mobile cellular networks, which are capacity constrained, are designed to support an increase in users and data traffic [3]. PU and SU are two distinct user kinds that have been added to the CR idea in order to alleviate the bandwidth shortage in wireless communication networks [4]. The former, a licensed user, has first dibs on the spectrum, but the latter, an unlicensed user, can utilize it as they see fit [5] [6].
The traditional CR spectrum access procedure consists of four stages: spectrum sensing, spectrum sharing, spectrum decision, and spectrum mobility [7] [8]. When there are numerous channels available, SUs pick one of them to connect with, during the spectrum choosing phase [9] [10] [11]. The latter describes a situation in which the sensed bandwidth exceeds the channel's coherence bandwidth. As a result, NB sensing techniques must make a trade-off between the higher count of accessible bands and a specific bandwidth [12]. Owing to their ignorance of the occupancy circumstances of the spectrum bands that need to be felt, existing CR spectrum access approaches have been crude and ineffective. Moreover, present spectrum access methods are incapable of detecting network modifications or even taking into account the needs of unlicensed users, which results in a worse QoS and unnecessary latency [13]. Future wireless communication networks will heavily rely on user-specific strategies; therefore, the traditional CR spectrum access has to be upgraded to be more efficient and quicker.
The paper contribution is.
• To provide a trustworthy SS method using a novel machine learning technique.
• To perform the classification stage using ISVM, where the iterations are tuned by novel hybrid optimization algorithm.
• To propose a novel form of hybrid optimization algorithm called GO-PSA for enhancing the classification stage and to compare the proposed method with existing algorithms to describe the superiority.
Machine learning has recently been applied to spectrum sensing to increase sensing sensitivity [14]. After extracting features in the spectrum sensing method, the classifier in machine learning-oriented approaches can use either soft or hard combining methods to make decisions. Although much work has been done to develop the effectiveness of machine learning-oriented SS approaches, very little of it has taken into account mobility impacts and various fading channel types, which we predict would have a significant influence on the outcomes [15].
The paper organization is as follows: Section I is the introduction of SS in CRNs. Section II is literature survey. Section III is system model and CRN for the proposed model. Section IV is SS and effective SS for the proposed model. Section V is ISVM and proposed GO-PSA for the developed effective SS in CRNs. Section VI is results. Section VII is conclusion.
2. Literature Survey
An extensive literature survey of critical and recent methods has been carried out and the findings have been comprehensively presented in Table 1.
Table 1. Comparison of existing methods
Limitations in existing methods:
➢ Most of methods provide good detection accuracies. However, they depend on extensive and meticulous design of learning architectures.
➢ Most of the methods especially exhibit slow learning characteristics in contrast to rapidly changing dynamic scenario of the receiver channel which increases latency and even high false alarm probabilities.
➢ Some methods are rule based and hence there is a need to continuously monitor and modify the rules as per changing dynamic scenario.
➢ Selection of optimal features for the classification/detection process is always and has been observed to be a challenging issue.
3. System model and Cognitive Radio Network for the proposed model
3.1 System Model
The utilized quantization technique and the energy detection technique are detailed in this part. This section describes the creation of the sensing report that is utilized in the spectrum sensing program's training and classification phases [26]. If the FC determines that there is a spectral hole, the CR user transmits data. Users of CR work in half-duplex mode, which allows them to either send or receive at any one moment. Users of CR are presumptively near to the PU and away from remaining PUs. Fig. 1 depicts the system model.
Fig. 1. System Model
CSS creates spatial diversity, whereas mini slotting the sensing slot creates temporal diversity. The ideal length of a sensing slot was explored by the authors in [27]. The length of a poor sensing slot is taken into account in this study. When fading and shadowing events are prevalent, the sensing outcome might alter. By detecting the spectrum times during the sensing window, temporal diversity mitigates these effects. The sensing slot is again split into mini slots in this research. The spectrum is separately detected in every mini slot.
The sensing ability can be enhanced by increasing the count of mini slots and subsequently the sensing time, however this reduces the transmission slot duration [27]. [27] asserts that the introduction of diversity reception into the sensing procedure occurs when the channel is separately sensed in mini slots during the similar sensing period. The outcomes of these mini slots are merged in the suggested method to create a sensing report, which is then utilized in the classification stage. To determine every CR user's level of confidence in a CRN that is being attacked by hostile users, the sensing reports were actually employed in [28].
The sensing data in this study are utilised to train the classifiers and are next employed to categorise the most recent sensing report. This presents a half-duplex CR user framework where no CR users communicate during the sensing slot. The CR users communicate in the transmission slot if it is determined during the sensing slot that the PU is not present; else, they stay neutral. The CR users perceive the spectrum once more after the time frame's lifetime, comes to an end. Every mini slot makes advantage of energy detection. The energy that the 𝑗𝑡ℎCR user acquired in the 𝜔𝑡ℎ sensing slot in the 𝑙𝑡ℎ mini slot 𝑌𝑙,𝜔,𝑗 may be represented as
𝑌𝑙,𝜔,𝑗 = ∑𝑘=100⌈𝑓𝑙,𝜔,𝑗(𝑘)⌉2 (1)
Here, 𝑂0 shows the total count of samples, denoted by 𝑙 ∈ {1,2,3, ⋯ , 𝑜}and 𝑜𝑜shows the total count of minislots, 𝑓𝑙,𝜔,𝑗(𝑘)shows the 𝑘𝑡ℎ energy sample obtained at the ��𝑡ℎ mini slot of the 𝜔𝑡ℎ sensing slot. The detection time 𝑈 as well as the signal bandwidth 𝐶 is both expressed in Hertz. The bandwidth linked with the detected spectrum as well as the sensing duration determine how many samples are received in a certain minislot. The received signal 𝑓𝑙,𝜔,𝑗(𝑘), is presented in both the existence of PU (𝐼1) and lack of PU (𝐼0)as below.
\(\begin{aligned} f_{l, \omega, j}(k)= \begin{cases} \qquad w_{l, \omega, j}(k) ; & I_{0} \\ t_{l, \omega, j}(k)+w_{l, \omega, j}(k) & I_{1} \end{cases} \end{aligned}\) (2)
Here, 𝑡𝑙,𝜔,𝑗(𝑘) shows the 𝑘𝑡ℎ sample of the PU signal received at the 𝑙𝑡ℎ minislot of the 𝜔𝑡ℎ sensing slot by the 𝑗𝑡ℎ CR user, and 𝑤𝑙,𝜔,𝑗(𝑘) shows zero-mean Additive White Gaussian Noise (AWGN). The pdf of the energy of the received signal at the 𝑗𝑡ℎ CR user 𝑌𝑙,𝜔,𝑗 continues to follow a central chisquare distribution having mean 𝜇0 and variance 𝜎02 if the primary signal is unavailable, and a noncentral chisquare distribution having mean 𝜇1 and variance 𝜎12 if the primary signal is present.
\(\begin{align} 𝜇_0 &= 𝑂_0\\ 𝜎_0^2&= 2𝑂_0\\ 𝜇_1& = 𝑂_0(𝛾_𝑗 + 1)\\ 𝜎_1^2& = 2𝑂_0(2𝛾_𝑗 + 1) \end{align}\) (3)
Here, 𝛾𝑗 shows the SNR of the 𝑗𝑡ℎ CR user's received signal. The energy signal received 𝑌𝑙,𝜔,𝑗 beneath both hypotheses 𝐼0 and 𝐼1 can be roughly represented by a Gaussian random variable when the total count of samples, 𝑂0, is high. The energy signal at every minislot in this approach is quantized into distinct zones.
The slotted-frame architecture, in which a frame becomes single unit of accessibility to the spectrum, is explored in the study. Every frame's first slot, also known as the detecting slot, is utilized to sense the spectrum and determine whether or not the PU is active. Usually, they don't say anything during the entire transmission window. The CR users will begin detecting the spectrum once the broadcast slot has ended.
Since wireless channels fluctuate quickly, the spectrum is felt more than once rather than just once in order to take the channel's shifting behaviour into account. The detecting slot in the work is split into minislots to accomplish this. Every minislot's spectrum is individually felt, and a sensing report is created on the basis of the findings. Based on the quantized decision of every minislot, conveyed by Eq. (4), a sensing report is created that will be utilized in the subsequent classification phase.
There are four quantization levels in this project, or 𝑁 = 4 . 𝐴1, 𝐴2, 𝐴3, and 𝐴4 represents quantization zones or tese levels, respectively. In contrast to zones 𝐴3 and 𝐴4, which signify strong energy or the existence of the PU, zones 𝐴1 and 𝐴2 stand for low energy or the lack of the PU. These are the quantized energy zones:
\(\begin{aligned} v_{l,\omega, j}= \begin{cases} I_0 \begin{cases} A_1; \qquad Y_{l, \omega, j} \leq \lambda_{A_{1}}\\ A_2; \lambda_{A_{1}} < Y_{l, \omega, j} \leq \lambda_{A_{2}}\\ \end{cases}\\ I_1 \begin{cases} A_3; \lambda_{A_{2}} < Y_{l, \omega, j} \leq \lambda_{A_{3}}\\ A_4; \qquad Y{l, \omega, j} > \lambda_{A_{3}} \end{cases} \end{cases} \end{aligned}\) (4)
Here, 𝑣𝑙,𝜔,𝑗 stands for the quantized energy for the 𝑙𝑡ℎ minislot of the 𝜔𝑡ℎ sensing slot of the 𝑗𝑡ℎ CR user, and 𝜆𝐴1, 𝜆𝐴2, 𝜆𝐴3, and 𝜆𝐴4 describes the thresholds. The group of quantization zones is comprised of 𝑟 ∈ {𝐴1, 𝐴2, 𝐴3, 𝐴4}, while the group of thresholds is made up of 𝜆 ∈ {𝜆𝐴1, 𝜆𝐴2, 𝜆𝐴3, 𝜆𝐴4}. Equation (4) indicates that the average received energy at the 𝑗𝑡ℎ CR user at the 𝑙𝑡ℎ sensing slot (𝑌𝑙,𝜔,𝑗) can be quantized into either 𝐴1 or 𝐴2, and in the event of 𝐼0, 𝑌𝑙,𝜔,𝑗 is quantized into either 𝐴3 or 𝐴4. The quantization system interprets 𝐴1 and 𝐴2 as 𝐼0, whereas 𝐴3 and 𝐴4 as 𝐼1.
A sensing report made up of symbols from 𝑟 is created at every sensing slot. Sensing report refers to the report for the 𝑗𝑡ℎ CR user at the 𝜔𝑡ℎ sensing slot and is expressed by 𝑆𝑗,𝜔, which has 𝑜 items from 𝑟. This information is utilised by the machine learning algorithm as a feature vector. This data is categorised into a sensing class during the training stage on the basis of the global decision and the ACK.
3.2 Cognitive Radio Network
As long as PU communication is unaffected, CR users have unrestricted access to the spectrum [29] [30]. The spectrum is regularly checked for PU activity to make sure of this. Spectrum sensing may also be utilized to find spectrum openings and allow CR users to communicate when there exists a good opportunity. Through the usage of CSS, which entails numerous CR users working together to find spectral gaps, a CR state's performance gain is again increased.
While matched filtering works better than alternative methods like the use of cyclo stationary detection and energy detection, its complexity renders it problematic for spectrum sensing because of several systems. The easiest approach is energy detection in light of the constrained resources (such as energy and cognitive average CR users' power). CSS uses spatial variety, hence need maintaining of PU restrictions [31]. In CSS, each CR user provides data to a FC, which integrates local reports to reach a judgement at the global level. The real quantity of energy received, which has not been quantized into different levels, can be reported by CR users. This technique, known as a soft-decision pair, produces the best detection accuracy but, potentially, uses an infinite amount of bandwidth. As an option, CR users can decide definitively on the basis of the energy received [32]. Hard reporting uses less bandwidth but delivers less effective outcomes than soft reporting. Almost similar performance exists for likelihood ratio tests and linear soft combinations [33].
Here, the energy range can be quantized, as in [34], a mix of both soft and hard choices can be employed to optimize performance as well as bandwidth efficiency. The measured energy is quantized into four regions utilizing two bits in employing what is known as a "softened hard combination technique," with every zone being denoted by a label. This strikes a fair balance among the information lost during the quantization procedure and the enhanced performance brought on by smart reporting.
For example, an AND rule increases spectral hole identification but reduces the PU main criterion while an OR rule produces high PU protection but has the lowest spectral hole exploration capabilities [35]. Similar to this, the kout-N decision combination rule performs worse when there is poor sensing and/or malevolent CR users. PU protection and spectral hole discovery are improved by more complex combination methods, but they also demand previous knowledge that may not always be present in a single CR scenario [36].
The idea of CRs includes the idea of learning from the surroundings. Users of CR are bound to maintain an eye on their surroundings and adjust their operational parameters (transmitting power, operating frequency, etc.) to the shifting circumstances. Numerous writers have thought about machine learning methods to help CR users learn from the surroundings [37] [38] [39] [40] [41] [42]. SS cannot accurately establish the PU state on the basis of the current sensing slot alone since fading and shadowing can make it difficult to estimate the channel state [37]. Spectrum sensing on the basis of machine learning may, nevertheless, indirectly learn about the surrounding world. One benefit of machine learning-oriented spectrum sensing describes its ability to accurately identify PU activity without the need for prior environmental knowledge.
4. Spectrum Sensing and effective spectrum sensing for the proposed model
4.1 Spectrum Sensing
The suggested spectrum sensing method seeks to enhance PU detection performance in various situations to enhance spectral hole identification [43]. The next objective effectively takes use of spectrum access options to let the CR user transfer data. The energy vector is used to determine the channel accessibility for the 𝑗𝑡ℎ CR user during the 𝜔𝑡ℎ sensing slot (𝑆𝑗,𝜔). It is necessary to study the behaviour of the PU in order to accurately map 𝑆𝑗,𝜔, to PU activities. But in this situation, the energy vector is comparable to a feature vector in the area of machine learning.
A training step is required to build a classifier, which will categorise the current sensing report into channel available (𝐼0) or channel busy (𝐼1) classes. Energy vectors of size 𝑋 are stored by every CR user, in which 𝑋 shows the length of the training or training step. The slotted-frame architecture is employed in the training stage, and each one-time slot contains two phases: a sensing stage and a transmission stage. 𝑋 places are available throughout the training period. The classifier accepts these vectors as input during the classification stage, which determines whether the current sensing report is in the 𝐼0 or 𝐼1 category based on comparisons with pre recorded sensing reports.
In the suggested method, the sensing reports—which are created quantized energy vectors—are mapped to the precise condition of the PU so that the CR users may first understand how the PU behaves. Using ACK and a trustworthy mix of local decisions made by CR users that are decided by the FC, the real condition of the PU is discovered. The CR user's role during the training stage is distinct from its role during the classification stage. During the training stage, sensing reports are categorised into sensing classes based on the PU's real activity and the CR user's behaviour.
Training Stage: The 𝑗𝑡ℎ CR user creates a sensing report 𝑆𝑗,𝜔, generates a local determination on the basis of the average received energy in the active sensing slot, transmits the local determination to the FC, and then designates the sensing report to a sensing class on the basis of the FC's decision and the ACK's status. Assume a description of the energy received at the 𝑗𝑡ℎ CR user's 𝜔𝑡ℎ sensing slot 𝑍𝑗,𝜔, where
\(\begin{aligned}Z_{j, \omega}=\frac{\sum_{l=1}^{o} Y_{l, \omega, j}}{o}\end{aligned}\) (5)
Here, 𝑌𝑙,𝜔,𝑗 is provided by Eq. (1). In the training stage, the local choice for the 𝑗𝑡ℎ CR user at the 𝜔𝑡ℎ sensing slot is denoted by 𝑟𝑗,𝜔 and supplied by [31].
\(\begin{aligned} r_{j,\omega}= \begin{cases} I_0 \begin{cases} A_1; \qquad Z_{j, \omega} \leq \lambda_{A_{1}}\\ A_2; \lambda_{A_{1}} < Z_{j, \omega, j} \leq \lambda_{A_{2}}\\ \end{cases}\\ I_1 \begin{cases} A_3; \lambda_{A_{2}} < Z_{j, \omega, j} \leq \lambda_{A_{3}}\\ A_4; \qquad Z{j, \omega} > \lambda_{A_{3}} \end{cases} \end{cases} \end{aligned}\)
The FC receives the local choice and delivers a global judgement by combining the local decisions of entire CR users. Each component of the report relates to 𝑟, as can be observed. Each sensing slot for each CR user generates a sensing report (the current sensing report is denoted by 𝑆𝑗,𝜔), and the local decision is made in accordance with Eq. (6).
The global choice is then given back to the CR users. Users of the CR can choose to transmit or not, depending on the collective judgement. The ACK signal can be used to confirm whether the CR global decision is 𝐼0 or not. There exists no interference to the PU transmissions since the overlay Cognitive Radio Network is taken into consideration. The PU communication only affects the ACK signal when the SS outcome is incorrect and the actual ground truth is 𝐼1. The following are the list of probable situations and findings.
Finding 1: The global choice is also 𝐴1, as shows the local decision (𝑟𝑗,𝜔). The CR user transmits its data. Receiving an ACK indicates that the sensing outcome was accurate and that the PU's real state was 𝐼0. The actual state of the PU is determined via the ACK signal. When this choice (𝑆𝑗,𝜔) is made, the sensing report associated with it is placed in a class known as 𝑆1, but when there is no ACK signal, it is placed in 𝑆2.
Finding 2: Whether the global choice and the local decision (𝑟𝑗,𝜔) are 𝐴1 or 𝐴2, respectively, depends on the local decision 𝐴1. If the ACK is not returned after the CR user transmits, the sensing judgement was incorrect and the PU was accessible. The CR user will save 𝑆𝑗,𝜔 in a class called 𝑆2 with the value. When an ACK signal is received, 𝑆1 will store it. This method will also record 𝑆𝑗,𝜔 if the local choice is 𝐴1 and the global decision is 𝐴3 or 𝐴4.
Finding 3: The local choice (𝑟𝑗,𝜔) is 𝐴2, and 𝐴2 also applies to the global decision. The CR users follow the steps outlined in finding 1 for this operation. If ACK is obtained, the sensing choice was made correctly, and the PU is not available; else, the data 𝑆𝑗,𝜔 is saved in the 𝑆4 class.
Finding 4: The global decision is either 𝐴1 or 𝐴2, while the local decision is 𝐴2. When a CR user transmits, if an ACK is not returned, the class 𝑆𝑗,𝜔 is labelled 𝑆4; else, the class is labelled 𝑆3. Again, 𝑆𝑗,𝜔 will be saved in the class designated as 𝑆4 if the local choice is 𝐴2 and the global decision is either 𝐴3 or 𝐴4.
Finding 5: The local choice is 𝐴3, and so is the overall decision. In this situation, there won't be any transmission. Therefore, it is impossible to ascertain the PU's real condition. 𝑆𝑗,𝜔 will be enrolled in a class with the designation 𝑆5. If the global choice is 𝐴4 and the local decision is 𝐴3, the sensing report will likewise be kept in class 𝑆5.
Finding 6: The global choice is either 𝐴1 or 𝐴2, whereas the local choice is 𝐴3. The user of the CR will send. 𝑆𝑗,𝜔 will be saved in a class with the designation 𝑆6 if ACK is returned; else, it will be saved in 𝑆5.
Finding 7: The local and global choices are both 𝐴4. There will be no transmission, and 𝑆𝑗,𝜔 will be kept in the class 𝑆7 if the local decision is Z4 and the worldwide choice is Z3. 𝑆𝑗,𝜔 will also be kept in 𝑆7 if the local decision is 𝐴4 and the global decision is 𝐴3.
Finding 8: The global decision is either 𝐴1 or 𝐴2, whereas the local decision is 𝐴4. The user of the CR will send. If an ACK is obtained, 𝑆𝑗,𝜔 will be kept in class 𝑆8. In the absence of an ACK, 𝑆𝑗,𝜔 will be kept in 𝑆7.
The ACK signal is utilised when the global decision is 𝐼0, as shown in the findings above. The CR users do not broadcast when the global decision is 𝐼1, therefore the ACK signal cannot be utilised to determine the reality on the ground. As a result, when 𝐼1 is the FC's overall decision, the CR users store the current sensing report in classes 𝑆5 and 𝑆7 since there exists no other method to verify the current sensing choice without running the danger of interfering with the PU transmission.
These findings provide CR users past data that they may utilise in combination with their present sensing behaviour to more accurately forecast the PU state, as well as information regarding the environment around them and how it affects human behaviour. This method may be viewed as cooperative learning in which the influence of other CR users is included via the global choice in addition to the individual CR user's consideration. This increases the learning system' geographic variety by allowing a receiver having superior SNR settings to influence the behaviour of CR users having lower SNR circumstances.
The training process is continued till the CR user has received sufficient training in the environment's behaviour, comprising adjusting the SNR circumstances and the PU's behaviour. As a result of the constantly evolving sensory environment, fading can also have a short-term impact on the signal and corresponding energy received.
During the training stage, local training data is gathered from every CR user. The length of the training stage affects how well machine learning algorithms operate. Efficiency increases as training volume increases. A bigger region is encompassed by the PU as the count of CR users rises. The training stage can precisely predict how CR users would behave in response to PU activity since the modelling approach integrates the global decision by behaving in accordance with it and also via the ACK signal. With a significant training stage, the responses of CR users to different PU activity types may also be correctly predicted. The training stage of traditional machine learning approaches can collect enough training data to understand the surroundings. Since both the wireless channel and PU activity are random, it is almost impossible to determine their precise nature.
Classification stage: Information was obtained about the operating context and CR user behaviour in reaction to the dynamic world in the preceding step. The structure of CR networks makes it particularly difficult to learn the environment. Users of CR only get partial observations of the configuration files due to the noisy different characteristics. Users of CR are also required to send data. Therefore, limited sensing time and incomplete quantitative measurements make learning more difficult. A PU's status as an autonomous entity constitutes a third restriction. A CR user might not be familiar with the PU's behaviour, its operational parameters, the interference levels, RF environment, or the distribution of noise power.
Partial observability is dealt with by include the actions of the worldwide CR community into the learning experience decision. The ACK assists CR users in learning the split the sensing information according to the operational environment better properly into their various groups. The education strategy is effective and doesn't need any previous knowledge. The present instance is precisely classified into one among the sensing classes using improved SVM, a machine learning algorithm, which effectively detects PU activity.
4.2 Effective Spectrum Sensing
The local choices are sent to The FC as 𝐸𝑗 in which = ,3, ⋯ ,𝑂. Due to the fact that different CR users in CSS have different sensing capacities, different local sensing outcomes are produced [44]. We employ a weight-oriented decision combination at the FC in the suggested approach. Depending on their effectiveness, every CR user is given a weight. A partial global decision is taken at FC, denoted by 𝑀𝐻,𝑗, by eliminating the 𝑗𝑡ℎ CR user's response as
\(\begin{aligned} M_{H, j}= \begin{cases} I_{0} & O_{I_{0}}^{j}>O_{I_{1}}^{j} \\ I_{1} & \text { otherwise } \end{cases} \end{aligned}\) (7)
Here, 𝑂𝐼0𝑗 shows the count of CR users reporting 𝐼0 that do not include the 𝑗𝑡ℎ CR user's local choice and is stated as
𝑂j𝐼o = ∑O𝑗=1,𝑗≠𝑗𝐽0(𝐸𝑗 = 𝐼0) (8)
And the indicator function 𝐽0(𝐸𝑗 = 𝐼0) for 𝐼0 is provided by
\(\begin{aligned} J_{0}(E_{j}=I_{0})= \begin{cases} 1 ; & E_{j}=I_{0} \\ 0 ; & E_{j} \neq I_{0} \end{cases} \end{aligned}\) (9)
On the other side, 𝑂𝐼1𝑗 indicates the proportion of 𝑗𝑡ℎ CR users who reported 𝐼1 but did not provide their local decision.
𝑂𝐼1𝑗 = ∑𝑗=1,𝑗≠𝑗𝑂𝐽0(𝐸𝑗 = 𝐼1) (10)
Here, the indicator function for 𝐼1 is provided by and 𝐽0(𝐸𝑗 = 𝐼1) is provided.
\(\begin{aligned} J_{0}(E_{j}=I_{1}= \begin{cases} 1 ; & E_{j}=I_{1} \\ 0 ; & E_{j} \neq I_{1} \end{cases} \end{aligned}\) (11)
For entire CR users, partial global decisions are discovered. The majority vote is then used to integrate local choices as 𝑀𝐻,all, and may be expressed as
\(\begin{aligned} M_{H, \text { all }}= \begin{cases} I_{0} & O_{I_{0}}>O_{I_{1}} \\ I_{1} & \text { otherwise } \end{cases} \end{aligned}\) (12)
Here, the count of CR users who reported 𝐼0 is 𝑂𝐼0 and the count of CR users who reported 𝐼1 is 𝑂𝐼1. The weight for every CR user 𝛼𝑗 is derived on the basis of Eq. (7) and Eq. (12).
\(\begin{aligned} \alpha_{j}= \begin{cases} \alpha_{j}+1 & M_{H, j} \neq M_{H, all} \\ \alpha_{j} & M_{H, j}=M_{H, all } \end{cases} \end{aligned}\) (13)
Next, the cumulative weight for every hypothesis 𝛽𝑏, in which 𝑏 ∈ {𝐼0,𝐼1} is determined as follows:
𝛽𝑏 = ∑𝑗=10𝛼𝑗𝐽0(𝐸𝑗 = 𝑏) 𝑏 ∈ {𝐼0,𝐼1} (14)
Here, 𝐽0(𝐸𝑗 = 𝑏) is shown by
\(\begin{aligned} J_{0}(E_{j}=b)= \begin{cases} 1 ; \quad E_{j}=b \\ 0 ; \text { otherwise } \end{cases} \end{aligned}\) (15)
The final global decision is shown by 𝑀𝐻 and is computed as
\(\begin{aligned} M_{H}= \begin{cases} I_{0} & \beta_{I_{0}}>\beta_{I_{1}} \\ I_{1} & \text { otherwise } \end{cases} \end{aligned}\) (16)
The CR users receive the global decision back, and they next broadcast or remain silent in accordance with the global decision. Consider \(\begin{aligned}\beta=\sqrt{2 \gamma \sum_{l=1}^{O}\left|i_{l}\right|^{2}+1}\end{aligned}\) in which 𝑖𝑙 be the channel gain among the primary user and the 𝑗𝑡ℎ CR user during the 𝑙𝑡ℎ minislot, and assume 𝛾 be the mean SNR obtained from the PU. When nonfading channels are used, the system's probability of false alarm is expressed as [27] if it is considered that the state's coefficients are known.
\(\begin{aligned}Q_{g}^{T}=R\left(\beta R^{-1}\left(\overline{Q_{e}}\right)+\sqrt{O_{0}} \gamma \sum_{l=1}^{o}\left|i_{l}\right|^{2}\right)\end{aligned}\) (17)
Here, \(\begin{aligned}\overline{Q_{e}}\end{aligned}\) shows the system goal probability of detection and 𝑅(∙) shows the complementary distribution function of the standard Gaussian, which is 𝑅(Ҳ) = (1/2𝜋) ∫𝑦∞exp(−𝑢2/2)du. The goal probability of detection for effective spectrum sensing may be expressed as [45]
\(\begin{aligned}\overline{Q_{e}}=\prod_{n=1}^{N}\left\{\left(0-\sum_{\frac{\sum_{t=1}^{m}}{b_{C_{n}}}}^{O_{A_{t}}}\right)\left(Q_{I_{1}}\left(A_{n}\right)\right)^{o_{A_{n}}}\right\}\end{aligned}\) (18)
Here, 𝑂𝐴𝑛 shows the percentage of CR users who have made a local sensing choice in the zone 𝐴𝑛, 𝑚shows the greatest integer less than 𝑛, and 𝑄𝐼1(𝐴𝑛) seems to be the likelihood that a local sensing decision was made in the quantization zone 𝐴𝑛 beneath 𝐼1. The system's likelihood of detection can be expressed as [27].
\(\begin{aligned}Q_{e}^{T}=R\left(\beta R^{-1}\left(\overline{Q_{g}}\right)+\sqrt{O_{0}} \gamma \sum_{l=1}^{o}\left|i_{l}\right|^{2}\right)\end{aligned}\) (19)
Here, \(\begin{aligned}\overline{Q_{g}}\end{aligned}\) shows the system goal false alert probability and is provided by [46].
\(\begin{aligned}\overline{Q_{g}}=\prod_{n=1}^{N}\left\{\left(0-\sum_{\underset{t=1}{m} O_{C_{n}}}^{o_{A_{t}}}\right)\left(Q_{I_{0}}\left(A_{n}\right)\right)^{o_{A_{n}}}\right\}\end{aligned}\) (20)
Here, 𝑄𝐼0(𝐴𝑛) shows the likelihood that the local sensing decision in the quantization zone 𝐴𝑛 will be less than 𝐼0.
5. Improved SVM and Proposed GO-PSA for the developed effective spectrum sensing in cognitive rdio networks
5.1 Improved SVM
The improved SVM is used for the classification process of the developed effective spectrum sensing in CRN model. SVM represents a supervised learning technique for both classification as well as regression problems. To differentiate between the two classes of data points, one might pick from a variety of possible hyper-planes. The Eq. (1) may be used to locate the hyper-plane.
\(\begin{aligned}\vec{x} \cdot \vec{y}+c=0\end{aligned}\) (21)
Here, \(\begin{aligned}\vec{y}\end{aligned}\) shows the collection of points and \(\begin{aligned}\vec{x}\end{aligned}\) shows the normal vector to the hyperplane. The margin's width is (2/|𝑥|). The fact why SVM struggles to effectively function with large training sets is due to the fact that as the number of training vectors rises, so do the storage and computing needs. Thus, performance may be increased, and calculation time decreased by using improved SVM. Here, the iterations in SVM are tuned by novel GO-PSA, thus referred as improved SVM.
5.2 Proposed GO-PSA
The proposed GO-PSA is used for optimizing the iterations of SVM for the developed spectrum sensing in CRN model. The PSO technique was developed to simulate the behavioural patterns of a flock of birds, but once the algorithm was modified it was discovered that the individuals, here referred to as particles, were really engaged in optimisation. The PSO approach places the particles at random locations in the search space and then has them move in randomly chosen directions. A particle's trajectory is then progressively adjusted such that it will begin to migrate in the direction of its own and its competitors' best prior locations. As it searches in their neighbourhood, it will ideally find even better places with relation to some fitness metric. The PSO algorithm has several advantages such as better efficiency, simplicity, etc. But, it limits from the drawback of high computational complexity. Hence, to overcome the drawbacks, GOA is integrated into it and the so formed algorithm is referred as GO-PSA. This GO-PSA reduces the computational complexity as well as solves all forms of optimization related problems.
The core principle of the GOA swarm during the larval stage is the grasshoppers' sluggish mobility and short steps. In comparison, the adult swarm's primary characteristic is long-distance, rapid movement. Another crucial aspect of the grasshopper swarm is the search for food sources. The search agents are urged to move quickly during exploration, while they usually move slowly during exploitation. In addition to target finding, grasshoppers naturally carry out these two tasks. Thus, if we can represent this behaviour scientifically, we can create a brand-new algorithm that draws its inspiration from nature.
In the proposed GO-PSA algorithm, the process takes place using random-based concept. Therefore, if 𝑟 and ≤ 0.5, the update takes place using GOA as below.
\(\begin{aligned}Y_{j}^{e}=d\left(\sum_{\substack{k=1 \\ k \neq j}}^{O} d \frac{u b_{e}-l b_{e}}{2} t\left(\left|y_{k}^{e}-y_{j}^{e}\right|\right) \frac{y_{k}-y_{j}}{e_{j k}}\right)+\widehat{U}_{e}\end{aligned}\) (22)
Here, 𝑌𝑗 shows the position of the 𝑗𝑡ℎ grasshopper, 𝑒jk shows the disance among the 𝑗𝑡ℎ and 𝑘𝑡ℎ grasshopper, 𝑑 shows the decreasing coefficient that minimizes the comfort zone, \(\begin{aligned}\widehat{U}_{e}\end{aligned}\) shows the value of the 𝐸𝑡ℎ dimension in the target, 𝑙b𝑒 shows the lower bound in the 𝐸𝑡ℎ dimension, and 𝑢b𝑒 shows the upper bound in the 𝐸𝑡ℎ dimension respectively.
Otherwise, if 𝑟 and > 0.5, then the update takes place by PSO as below.
\(\begin{aligned}\vec{y} \leftarrow \vec{y}+\vec{w}\end{aligned}\) (23)
Here, the position of particle is shown by \(\begin{aligned}\vec{y}\end{aligned}\) and the velocity of particle is shown by \(\begin{aligned}\vec{w}\end{aligned}\) respectively. The pseudo code of novel GO-PSA is shown in algorithm 1.
Algorithm 1: Proposed GO-PSA
Start
Population initialization
Parameter initialization
Fitness calculation
While iter < itermax
If 𝑟 and ≤ 0.5
\(\begin{aligned}Y_{j}^{e}=d\left(\sum_{\substack{k=1 \\ k \neq j}}^{o} d \frac{u b_{e}-l b_{e}}{2} t\left(\left|y_{k}^{e}-y_{j}^{e}\right|\right) \frac{y_{k}-y_{j}}{e_{j k}}\right)+\widehat{U}_{e}\end{aligned}\)
else
\(\begin{aligned}\vec{y} \leftarrow \vec{y}+\vec{w}\end{aligned}\)
End if
iter = iter + 1
End
Stop
6. Results
6.1 Experimental Procedure
In this part, we examine the behavior of the suggested scheme and evaluate it against various schemes using system factors including the probability of detection, probability of spectral holes exploitation, and probability of error. The CR user will have more possibilities to transmit if the PU's idle probability is raised. The system's performance during the training phase is significantly impacted by the development of the sensing classes throughout this phase. The larger this phase, the more training instances there will be, increasing the count of reports that the current sensing report may match with. The description and the optimization parameters for GOA and PSO are shown in Table 2 below.
Table 2. Optimization parameters
6.2 Simulation Parameters
The simulation parameters considered for the proposed spectrum sensing in CRNs using improved machine learning-based optimization model is shown in Table 3.
Table 3. Simulation parameters
6.3 Probability of detection analysis
The system detection performance for the developed and the current models is shown in Fig. 2. The suggested plan operates better than the competition. The detection probability attained from the analysis showed that the proposed method shows better outcomes over the provided number of counts at various SNR levels, revealing its superiority.
Fig. 2. Probability of Detection Analysis
The explanation is because under low SNR regimes, the sensing reports are not far off from one another. The energies received in the low SNR for both theories have minimal difference between either sensing than normal plans. The suggested technique produces more dependable spectrum as the SNR increases.
6.4 Probability of error analysis
The error performance is shown in the Table 4. The suggested system has a low likelihood of error even in the low SNR zone, as can clearly be observed in this figure and table. The error probability defines the rate of occurrence of an error in a hypothetical infinite repetition of the process. Here, it is clearly elaborated that the developed model shows lesser error rate of occurrence than the considered existing methods, thus demonstrating its betterment. The approach demonstrates that the suggested strategy can produce more accurate spectrum sensing than previous methods.
Table 4. Probability of error analysis
6.5 Probability of spectral holes exploitation analysis
The effectiveness of the suggested technique to utilize spectral gaps is shown in Table 5. Utilizing chances for data transmission is of utmost importance from the viewpoint of a CR user. The suggested system enables CR users to take advantage of data transmission possibilities even in poor SNR circumstances. The sensing reports that are created are better reflections of the PU's activity in the region with high SNR. Because the PU signal will take up a bigger fraction of the received signal than the random noise, the sensing performance can be enhanced in the high SNR regimes. The secondary users exploit the presence of spectrum holes in an opportunistic manner for enhancing the spectrum usage. At various SNR levels, the probability of exploitation of spectral holes shows improved performance with developed methods than the traditional approaches, thereby demonstrating its effectiveness. These figure and table demonstrate how the suggested system may both more effectively secure PU data and offer more chances for data exchange.
Table 5. Probability of Spectral holes exploitation analysis
6.6 Average delay analysis
The time required to determine the channel availability for various classifiers is shown in the Fig. 3. More precisely, even while the values of the decision parameters fluctuate significantly with the count of training energy vectors, the count of decision parameters does not vary. Results showed that when the training samples of PU is higher than that of SUs, the average delay of SUs in the queue and the chance of SU packet loss are worse; however, when the training sample of both users is equal, performance is better. Hence, it can be clearly demonstrated that the proposed model returns less delay than the considered existing methods.
Fig. 3. Average Delay Analysis
6.7 Detection Time analysis
The detection time in this article, when the count of CRs is constant, is significantly quicker than the detection times in the remaining approaches, as shown in Fig. 4. The difficulty of computing rapidly rises as the count of CR users rises. The developed technique makes it feasible to see the whole spectrum situation at any one time. As the CR user count increases, the detection time gets lesser for the introduced model than the other state-of-the-art methods, thus revealing its superiority.
Fig. 4. Detection time Analysis
The suggested strategy, nevertheless, employs a cutting-edge machine learning technique to lessen the disturbance from rogue users to nearby users. On detection time, the quantity of malicious users has less of an impact. Consequently, in a large-scale CRN, the suggested approach has high detection efficiency.
6.8 Convergence analysis
The convergence analysis of various algorithms for the developed spectrum sensing in CRN model is shown clearly in the Fig. 5. A total of 500 iterations are considered for running the convergence analysis process. The introduced model reveals better convergence outcomes than other conventional methods at various iteration reveals, thus demonstrating the betterment of the proposed method. It can be clearly demonstrated that the proposed model achieves faster convergence rate than all the considered state-of-the-art methods respectively at various iteration counts.
Fig. 5. Convergence Analysis
7. Conclusion
A trustworthy spectrum sensing approach based on novel machine learning was suggested in this research. The suggested system adapts to its surroundings by taking into consideration the actual state of the PU. The current sensing report was classified into one among the sensing classes once the sensing reports have been stored in the relevant sensing classes. The status of the PU was determined by the classification outcome. An innovative decision combination system at the FC that took into consideration the dependability of the CR users combines local decisions. Effective spectrum sensing was ensured by both CR level and FC level mechanisms. According to simulation findings, the suggested approach outperforms traditional approaches in terms of various measures. Some limitations observed are significant waiting time for the convergence to occur especially in case of dense networks. considerable complexity in the construction of the hybrid evolutionary model is another limitation which needs to be worked on.
References
- G. Yang, J. Wang, J. Luo, O. Y. Wen, H. Li, Q. Li, and S. Li, "Cooperative spectrum sensing in heterogeneous cognitive radio networks based on normalized energy detection," IEEE Trans. Veh. Technol., vol. 65, no. 3, pp. 1452-1463, Mar. 2016.. https://doi.org/10.1109/TVT.2015.2413787
- S. Dannana, B. P. Chapa, and G. S. Rao, "Spectrum sensing for fading wireless channel using matched filter," Soft Computing for Problem Solving (Advances in Intelligent Systems and Computing), vol. 817, pp. 339-345, Oct. 2018. https://doi.org/10.1007/978-981-13-1595-4_27
- Y. Ma, Y. Gao, A. Cavallaro, C. G. Parini, W. Zhang, and Y.-C. Liang, "Sparsity independent subNyquist rate wideband spectrum sensing on real-time TV white space," IEEE Trans. Veh. Technol., vol. 66, no. 10, pp. 8784-8794, Oct. 2017. https://doi.org/10.1109/TVT.2017.2694706
- H. Sun, A. Nallanathan, C.-X. Wang, and Y. Chen, "Wideband spectrum sensing for cognitive radio networks: A survey," IEEE Wireless Commun., vol. 20, no. 2, pp. 74-81, Apr. 2013. https://doi.org/10.1109/MWC.2013.6507397
- T. Yucek and H. Arslan, "A survey of spectrum sensing algorithms for cognitive radio applications," IEEE Commun. Surveys Tuts., vol. 11, no. 1, pp. 116-130, March 2009. https://doi.org/10.1109/SURV.2009.090109
- S. Zhang, Y. Wang, P. Wan, Y. Zhang, X. Li, and J. Li, "A cooperative spec trum sensing method based on information geometry and fuzzy C-means clustering algorithm," EURASIP J. Wireless Commun. Netw., vol. 2019. no. 1, pp.1-12, Dec. 2019. https://doi.org/10.1186/s13638-018-1318-8
- I. F. Akyildiz, B. F. Lo, and R. Balakrishnan, "Cooperative spectrum sensing in cognitive radio networks: A survey," Physical Communications, vol. 4, no. 1, pp. 40-62, March 2011. https://doi.org/10.1016/j.phycom.2010.12.003
- E. C. Peh, Y.-C. Liang, Y. L. Guan, and Y. Zeng, "Optimization of cooperative sensing in cognitive radio networks: A sensing-throughput tradeoff view," in Proc. of 2009 IEEE International Conference on Communications, pp. 1-5, Nov. 2009.
- J. Ma, G. Zhao, and Y. Li, "Soft combination and detection for cooperative spectrum sensing in cognitive radio networks," IEEE Trans. Wireless Commun., vol. 7, no. 11, pp. 4502-4507, Nov. 2008. https://doi.org/10.1109/T-WC.2008.070941
- K.-J. Lei, Y.-H. Tan, X. Yang, and H.-R. Wang, "A K-means clustering based blind multiband spectrum sensing algorithm for cognitive radio," J. Central South Univ., vol. 25, no. 10, pp. 2451-2461, Oct. 2018. https://doi.org/10.1007/s11771-018-3928-z
- A. Ghasemi and E. S. Sousa, "Spectrum sensing in cognitive radio networks: The cooperation-processing tradeoff," Wireless Commun. and Mobile Comput., vol. 7, no. 9, pp. 1049-1060, Nov. 2007. https://doi.org/10.1002/wcm.480
- G. Ganesan and Y. G. Li, "Cooperative spectrum sensing in cognitive radio - part I: Two user networks," IEEE Trans. Wireless Commun., vol. 6, no. 6, pp. 2204-2213, Jun. 2007. https://doi.org/10.1109/TWC.2007.05775
- J. Unnikrishnan and V. V. Veeravalli, "Cooperative sensing for primary detection in cognitive radio," IEEE J. Sel. Topics Signal Process., vol. 2, no. 1, pp. 18-27, Feb. 2008. https://doi.org/10.1109/JSTSP.2007.914880
- K. W. Choi, E. Hossain, and D. I. Kim, "Cooperative spectrum sensing under a random geometric primary user network model," IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 1932-1944, June 2011. https://doi.org/10.1109/TWC.2011.040411.101430
- L Khalid and A.Anpalagan, "Principles and Challenges of Cooperative Spectrum Sensing in Cognitive Radio Networks," Handbook of Cognitive Radio, pp.1-31, May 2017.
- K. M. Thilina, K. W. Choi, N. Saquib and E. Hossain, "Machine Learning Techniques for Cooperative Spectrum Sensing in Cognitive Radio Networks," IEEE Journal on Selected Areas in Communications, vol. 31, no. 11, pp. 2209-2221, November 2013. https://doi.org/10.1109/JSAC.2013.131120
- Mengbo Zhang, Lunwen Wang and Yanqing Feng, "Distributed cooperative spectrum sensing based on reinforcement learning in cognitive radio networks," AEU - International Journal of Electronics and Communications, vol. 94, pp. 359-366, September 2018. https://doi.org/10.1016/j.aeue.2018.07.029
- M. Ozturk, M. Akram, S. Hussain and M. A. Imran, "Novel QoS-Aware Proactive Spectrum Access Techniques for Cognitive Radio Using Machine Learning," IEEE Access, vol. 7, pp. 70811-70827, May 2019.. https://doi.org/10.1109/access.2019.2918380
- Xin Liu, Xueyan Zhang, Hua Ding and Bao Peng, "Intelligent clustering cooperative spectrum sensing based on Bayesian learning for cognitive radio network," Ad Hoc Networks, vol. 94,pp.1-9, November 2019. https://doi.org/10.1016/j.adhoc.2019.101968
- Krishna Kant Singh, Piyush Yadav, Akansha Singh, Gaurav Dhiman and Korhan Cengiz, "Cooperative spectrum sensing optimization for cognitive radio in 6 G networks," Computers and Electrical Engineering, vol. 95, pp.1-12, October 2021. https://doi.org/10.1016/j.compeleceng.2021.107378
- Md Shamim Hossain and Md Sipon Miah, "Machine learning-based malicious user detection for reliable cooperative radio spectrum sensing in Cognitive Radio-Internet of Things," Machine Learning with Applications, vol. 5, pp.1-9, September 2021. https://doi.org/10.1016/j.mlwa.2021.100052
- Ramsha Ahmed, Yue-Yun Chen, Bilal Hassan and Liping Du, "CR-IoTNet: Machine learning based joint spectrum sensing and allocation for cognitive radio enabled IoT cellular networks," Ad Hoc Networks, vol. 112, pp.1-18, March 2021. https://doi.org/10.1016/j.adhoc.2020.102390
- C. Wang, Y. Xu, Z. Chen, J. Tian, P. Cheng and M. Li, "Adversarial Learning-Based Spectrum Sensing in Cognitive Radio," IEEE Wireless Communications Letters, vol. 11, no. 3, pp. 498-502, March 2022.. https://doi.org/10.1109/LWC.2021.3133883
- A. Paul and S. P. Maity, "Machine Learning for Spectrum Information and Routing in Multihop Green Cognitive Radio Networks," IEEE Transactions on Green Communications and Networking, vol. 6, no. 2, pp. 825-835, June 2022. https://doi.org/10.1109/TGCN.2021.3127308
- M. A. Abusubaih and S. Khamayseh, "Performance of Machine Learning-Based Techniques for Spectrum Sensing in Mobile Cognitive Radio Networks," IEEE Access, vol. 10, pp. 1410-1418, Jan.2022. https://doi.org/10.1109/ACCESS.2021.3138888
- J. Ma, G. Zhao, and Y. Li, "Soft combination and detection for cooperative spectrum sensing in cognitive radio networks," IEEE Transactions on Wireless Communications, vol. 7, no. 11, pp. 4502-4507, Nov.2008. https://doi.org/10.1109/T-WC.2008.070941
- Y.-C. Liang, Y. Zeng, E. Peh, and A. T. Hoang, "Sensing throughput tradeof for cognitive radio networks," IEEE Trans actions on Wireless Communications, vol. 7, no. 4, pp. 1326-1337, April 2008. https://doi.org/10.1109/TWC.2008.060869
- H. A. Shah, M. Usman, and I. Koo, "Bioinformatics-inspired quantized hard combination-based abnormality detection for cooperative spectrum sensing in cognitive radio networks," IEEE Sensors Journal, vol. 15, no. 4, pp. 2324-2334, April 2015. https://doi.org/10.1109/JSEN.2014.2375363
- S. Janani, M. Ramaswamy, and J. Samuel Manoharan, "An optimized congestion retrieval mechanism for cognitive radio sensor network," Journal of computational and theoretical nanoscience, vol. 16, no. 4, pp. 1563 - 1572, April 2019.
- J. S. Manoharan, J. S., "Review on Ubiquitous Clouds and Personal Mobile Networks," Journal of Sustainable Wireless Systems, Vol. 1, no. 3, pp. 176 - 188, September 2019. https://doi.org/10.36548/jsws.2019.3.004
- R. Fan and H. Jiang, "Optimal multi-channel cooperative sens ing in cognitive radio networks," IEEE Transactions on Wireless Communications, vol. 9, no. 3, pp. 1128-1138, March 2010. https://doi.org/10.1109/TWC.2010.03.090467
- C.P.M. Rangel and L.A.R da Silva Mello, "Analysis of performance of fusion rules for cooperative spectrum sensing," in Proc. of IEEE Latin-American Conference on Communications (LATINCOM),vol. 4,pp.1-6, April 2019.
- H. Guo, W. Jiang, and W. Luo, "Linear Soft Combination for Cooperative Spectrum Sensing in Cognitive Radio Networks," IEEE Communications Letters, vol. 21, no. 7, pp. 1573-1576, July 2017. https://doi.org/10.1109/LCOMM.2017.2686393
- H. Sakran and M. Shokair, "Hard and softened combination for cooperative spectrum sensing over imperfect channels in cognitive radio networks," Telecommunication Systems, vol. 52, no. 1, pp. 61-71, jan.2013. https://doi.org/10.1007/s11235-011-9467-7
- P. Kaligineedi and V. K. Bhargava, "Sensor allocation and quantization schemes for multi-band cognitive radio cooperative sensing system," IEEE Transactions on Wireless Communications, vol. 10, no. 1, pp. 284-293, Jan.2011. https://doi.org/10.1109/TWC.2010.102810.100650
- R. Chen, J.-M. Park, and K. Bian, "Robust distributed spectrum sensing in cognitive radio networks," in Proc. of the 27th Conference on Computer Communications (INFOCOM '08), vol.7, pp. 1876-1884, July 2008..
- Z. Han, R. Zheng, and H. V. Poor, "Repeated auctions with Bayesian nonparametric learning for spectrum access in cognitive radio networks," IEEE Transactions on Wireless Communications, vol. 10, no. 3, pp. 890-900, March 2011. https://doi.org/10.1109/TWC.2011.010411.100838
- J. Lund'en, V. Koivunen, S. R. Kulkarni, and H. V. Poor, "Reinforcement learning based distributed multiagent sensing policy for cognitive radio networks," in Proc. of the 2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN), vol.10, pp. 642-646, May 2011.
- M. Bkassiny, S. K. Jayaweera, and K. A. Avery, "Distributed Reinforcement Learning based MAC protocols for autonomous cognitive secondary users," in Proc. of the 20th Annual Wireless and Optical Communications Conference, (WOCC '11), Taiwan, vol. 8, pp. 1-6, Nov.2011.
- A. Galindo-Serrano and L. Giupponi, "Distributed Q-learning for aggregated interference control in cognitive radio networks," IEEE Transactions on Vehicular Technology, vol. 59, no. 4, pp. 1823-1834, April 2010. https://doi.org/10.1109/TVT.2010.2043124
- B. Y. Reddy, "Detecting Primary Signals for Efficient Utilization of Spectrum Using Q-Learning," in Proc. of the 2008 Fifth International Conference on Information Technology: New Generations (ITNG), vol. 11, pp. 360-365, Aug 2008.
- Q. Zhu, Z. Han, and T. Basar, "No-Regret Learning in Collaborative Spectrum Sensing with Malicious Nodes," in Proc. of the 2010 IEEE International Conference on Communications, vol. 10, pp. 1-6, June 2010.
- K. Taniuchi, Y. Ohba and V. Fajardo, "IEEE 802.21: Media Independent Handover: Features, Applicability, and Realization," IEEE Communications Magazine, vol. 47, no. 1, pp. 112-120, Jan.2009. https://doi.org/10.1109/MCOM.2009.4752687
- M. Usman and K. Insoo, "Secure cooperative spectrum sensing via a novel user-classification scheme in cognitive radios for future communication technologies," Symmetry, vol. 7, no. 2, pp. 675-688, May 2015. https://doi.org/10.3390/sym7020675
- H. Birkan Yilmaz, T. Tugcu, and F. Alagoz, "Novel quantization based spectrum sensing scheme under imperfect reporting channel and false reports," International Journal of Communication Systems, vol. 27, no. 10, pp. 1459-1475, Oct. 2014. https://doi.org/10.1002/dac.2408
- Z. Han, R. Zheng, and H. V. Poor, "Repeated auctions with Bayesian nonparametric learning for spectrum access in cognitive radio networks," IEEE Transactions on Wireless Communications, vol. 10, no. 3, pp. 890-900, March 2011.. https://doi.org/10.1109/TWC.2011.010411.100838
- Shahrzad Saremi, Seyedali Mirjalili and Andrew Lewis, "Grasshopper Optimisation Algorithm: Theory and application," Advances in Engineering Software, vol. 105, pp. 30-47, March 2017. https://doi.org/10.1016/j.advengsoft.2017.01.004
- M.E.H.Pedersen and A.J.Chipperfield, "Simplifying Particle Swarm Optimization," Applied Soft Computing, vol. 10, no. 2, pp. 618-628, March 2010. https://doi.org/10.1016/j.asoc.2009.08.029
- D.W. Xie and S.L. Shi, "Prediction for Burned Area of Forest Fires Based on SVM Model," Applied Mechanics and Materials, vol.513-517, pp.4084-4089, june 2014. https://doi.org/10.4028/www.scientific.net/AMM.513-517.4084
- Waleed Ejaz, Najam Ul Hasan, Saleem Aslam, and Hyung Seok Kim, "Fuzzy Logic Based Spectrum Sensing for Cognitive Radio Networks," in Proc. of 5th International Conference on Next Generation Mobile Applications, Services and Technologies, NGMAST 2011, Cardiff, United Kingdom, vol. 9, pp.185-189, Sep.2011.