• Title/Summary/Keyword: Cognitive Network

Search Result 678, Processing Time 0.035 seconds

Exploiting cognitive wireless nodes for priority-based data communication in terrestrial sensor networks

  • Bayrakdar, Muhammed Enes
    • ETRI Journal
    • /
    • v.42 no.1
    • /
    • pp.36-45
    • /
    • 2020
  • A priority-based data communication approach, developed by employing cognitive radio capacity for sensor nodes in a wireless terrestrial sensor network (TSN), has been proposed. Data sensed by a sensor node-an unlicensed user-were prioritized, taking sensed data importance into account. For data of equal priority, a first come first serve algorithm was used. Non-preemptive priority scheduling was adopted, in order not to interrupt any ongoing transmissions. Licensed users used a nonpersistent, slotted, carrier sense multiple access (CSMA) technique, while unlicensed sensor nodes used a nonpersistent CSMA technique for lossless data transmission, in an energy-restricted, TSN environment. Depending on the analytical model, the proposed wireless TSN environment was simulated using Riverbed software, and to analyze sensor network performance, delay, energy, and throughput parameters were examined. Evaluating the proposed approach showed that the average delay for sensed, high priority data was significantly reduced, indicating that maximum throughput had been achieved using wireless sensor nodes with cognitive radio capacity.

An Adaptive Probe Detection Model using Fuzzy Cognitive Maps

  • Lee, Se-Yul;Kim, Yong-Soo
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.660-663
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using Fuzzy Cognitive Maps(FCM) that can detect intrusion by the Denial of Service(DoS) attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The Sp flooding Preventer using Fuzzy cognitive maps(SPuF) model captures and analyzes the packet information to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. The result of simulating the "KDD ′99 Competition Data Set" in the SPuF model shows that the Probe detection rates were over 97 percentages.

  • PDF

Cooperative Spectrum Sensing for Cognitive Radio Networks with Limited Reporting

  • So, Jaewoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.2755-2773
    • /
    • 2015
  • Cooperative spectrum sensing increases the detection performance in a cognitive radio network, based on the number of sensing nodes. However, as the number of sensing nodes increases, the reporting overhead linearly increases. This paper proposes two kinds of cooperative spectrum sensing with limited reporting in a centralized cognitive radio network, a soft combination with threshold-based reporting (SC-TR) and a soft combination with contention-based reporting (SC-CR). In the proposed SC-TR scheme, each sensing node reports its sensing result to the fusion center through its own reporting channel only if the observed energy value is higher than a decision threshold. In the proposed SC-CR scheme, sensing nodes compete to report their sensing results via shared reporting channels. The simulation results show that the proposed schemes significantly reduce the reporting overhead without sacrificing the detection performance too much.

Modern Linguistics: Theoretical Aspects of the Development of Cognitive Semantics

  • Nataliia Mushyrovska;Liudmyla Yursa;Oksana Neher;Iryna Pavliuk
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.162-168
    • /
    • 2023
  • This article presents an examination of the major cognitive-semantic theories in linguistics (Langacker, Lakoff, Fillmore, Croft). The CST's foundations are discussed concerning the educational policy changes, which are necessary to improve the linguistic disciplines in the changing context of higher education, as well as the empowerment and development of the industry. It is relevant in the light of the linguistic specialists' quality training and the development of effective methods of language learning. Consideration of the theories content, tools, and methods of language teaching, which are an important component of quality teaching and the formation of a set of knowledge and skills of students of linguistic specialties, remains crucial. This study aims to establish the main theoretical positions and directions of cognitive-semantic theory in linguistics, determine the usefulness of teaching the basics of cognitive linguistics, the feasibility of using methods of cognitive-semantic nature in the learning process. During the research, the methods of linguistic description and observation, analysis, and synthesis were applied. The result of the study is to establish the need to study basic linguistic theories, as well as general theoretical precepts of cognitive linguistics, which remains one of the effective directions in the postmodern mainstream. It also clarifies the place of the main cognitive-semantic theories in the teaching linguistics' practice of the XXI century.

Performance Analysis of Multiple Access for Secondary Users in The Spectrum Sensing Cognitive Radio (스펙트럼 감지 무선 인지 네트워크에서 이차 사용자들의 다중 접속 성능 분석)

  • Hong, Seung Geun;Lee, Jae Hong
    • Journal of Broadcast Engineering
    • /
    • v.21 no.1
    • /
    • pp.113-116
    • /
    • 2016
  • Cognitive radio network technology is that secondary (unlicensed) users use the spectrum of primary (licensed) users without interfering primary communication. In this paper, we propose multiple access scheme for a cognitive radio network, where multiple secondary users access spectrum of one primary user. We consider two types of multiple access scheme, one is p-persistent and one is non-persistent, and apply these two schemes in the secondary network. For each multiple access scheme, total throughput of secondary network is derived and verified by Monte Carlo simulation. Simulation results show that maximum total throughput of the secondary network is achieved when channel access probability or the number of maximum waiting frames is chosen appropriately.

PERFORMANCE ANALYSIS OF COGNITIVE NETWORK WITH PRIMARY AND SECONDARY CHANNELS

  • Lee, Yutae
    • East Asian mathematical journal
    • /
    • v.29 no.1
    • /
    • pp.101-107
    • /
    • 2013
  • We consider a cognitive network with a primary and a secondary channel. Primary users have higher priority on the usage of the primary channel, and secondary users are allowed to opportunistically access the primary channel at times when the channel is not occupied by primary users. The secondary channel is dedicated only to secondary users. An analytical model is presented to obtain the performance of an opportunistic spectrum access using both the primary and secondary channels, and is validated by simulations.

Spectrum Sensing Method of Cognitive Network applying Energy Harvesting (에너지 하베스팅이 적용된 스펙트럼 감지 방안)

  • Kim, Tae-Wook;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.73-76
    • /
    • 2015
  • In this paper, we propose energy harvesting apply to spectrum sensing. In this case, we can be spectrum sensing without consume energy. Algorithms of sensing and harvesting are determine active or idle of primary network, Compares with the threshold energy and the amount of energy that is harvested by energy harvesting scheme. If the secondary network want to send a message while the primary network is active, secondary users will change frequency to use the spectrum. Further, if the secondary network has not message, it will continues harvest energy. Therefore, spectrum sensing applied the energy harvesting method, energy of secondary network is remove waste and charge energy. So, efficiency and utilization of cognitive network can be increase.

Effectiveness of using Cognitive Virtual Tours based on Marzano Model to Develop the Achievement and Historical Research Skills for Secondary School Students

  • Abdalla, Atef Mohamed Saied
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.292-298
    • /
    • 2022
  • The study aimed to measure the effectiveness of using Cognitive virtual tours based on Marzano model to develop the achievement and some of historical research Skills for secondary school students. To achieve the objectives of the study, the experimental method was used and two study groups consisted of (60) students were divided into two groups, one is Control (30) students and the other is in experimental (30) students at Alsalam secondary in Ismailia Governorate. The study used several tools: The experimental processing tool of Cognitive Virtual tours based on Marzano model, Cognitive achievement test for the first unit of Secondary first grade history Course. Historical research skills. The finding of the study showed the effectiveness of using cognitive virtual tours based on Marzano model in developing the achievement and some of historical research skills for first grade secondary students which there are Statistically differences at level (0.01) between the average scores of the students in (experimental and Control) groups in post application for Cognitive achievement test. Practical application of the study can contribute to clarify how to use Cognitive virtual tours based on Marzano model in teaching history, and Draw the attention of history developers to the development of historical research skills.

Resolving Security Issues of Cognitive Radio Networks

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.797-799
    • /
    • 2012
  • The cognitive radio (CR) network has been studied in the form of open source by vast number of communities, and the potential expectation is very high since the CR is based on reprogrammable platform. However, as the peer-to-peer software has been abused, so high is the chance that the CR network can be abused public wide. Consequently, the benefit from the study of next-generation wireless network can be at risk because law breakers could abuse the CR. In this contribution, we analyze the issues and the problems of the CR and discuss an efficient measure against security attacks.

  • PDF

A Novel Cooperative Spectrum Sensing Algorithm in Cognitive Radio Systems

  • Zheng, Xueqiang;Wang, Jinlong;Wu, Qihui;Shen, Liang
    • Journal of Communications and Networks
    • /
    • v.11 no.2
    • /
    • pp.115-121
    • /
    • 2009
  • In cognitive radio (CR) systems, cognitive users can use the frequency bands when the primary users are not present. Hence, reliable detection of available spectrum is foundation of cognitive radio technology. To ensure unimpaired operation of primary users, cooperative spectrum sensing is needed. To reduce the network overhead of cooperative spectrum sensing, a novel cooperative spectrum sensing algorithm based on credibility is proposed. In particular, the close-form expressions for probability of detection and false-alarm are derived for the novel algorithm, and expression for the average overhead used for cooperation is given. The thresholds design method for the algorithm is also discussed. The conclusion is proved by computer simulations.