• Title/Summary/Keyword: cognitive engineering

Search Result 1,308, Processing Time 0.032 seconds

Vicious Cycle of MAC Protocols of Cognitive Radio Ad Hoc Networks: Problem Statement

  • Htike, Zaw;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.294-296
    • /
    • 2012
  • In cognitive radio ad hoc networks, secondary users need to exchange control information before data transmission. This task is not trivial in cognitive radio networks due to the dynamic nature of environment. This problem is sometime called rendezvous problem of cognitive radio network. The rendezvous problem is normally tackled by using two famous approaches: the use of common control channel (CCC) and using channel hopping (a.k.a sequence-based protocols). However, these two famous solutions form a vicious cycle while solving the rendezvous problem. The main purpose of this paper is to point out how and why this vicious cycle is formed.

Cognitive UWB-OFDM: Pushing Ultra-Wideband Beyond Its Limit via Opportunistic Spectrum Usage

  • Arslan Huseyin;Sahin Mustafa E.
    • Journal of Communications and Networks
    • /
    • v.8 no.2
    • /
    • pp.151-157
    • /
    • 2006
  • In a continuously expanding wireless world, the number of radio systems increases every day and efficient spectrum usage becomes a more significant requirement. Ultra-wideband (UWB) and cognitive radio are two exciting technologies that offer new approaches to the spectrum usage. The main objective of this paper is to shed the first light on the marriage of these two important approaches. The strength of orthogonal frequency division multiplexing (OFDM) based UWB in co-existing with licensed systems is investigated. The opportunity concept is defined, and the requirements of the opportunistic spectrum usage are explained. It is proposed to take the UWB-OFDM from the current underlay implementation, and evolve it to a combined underlay and opportunistic spectrum usage technology, leading to cognitive UWB-OFDM. This way, we aim at making UWB more competitive in the wireless market with extended range, higher capacity, better performance, and a wide variety of applications.

Dynamic Spectrum Allocation MAC Protocol based on Cognitive Radio for QoS Support (QoS 보장을 위한 Cognitive Radio 기반의 동적인 스펙트럼 할당 MAC 프로토콜)

  • Sun, Xianfeng;Joe, In-Whee
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.155-159
    • /
    • 2008
  • 비능률적인 스펙트럼 이용률과 제한적인 스펙트럼 밴드 사용의 문제점을 해결하기 위하여, Cognitive Radio가 중요한 솔루션으로써 많은 연구가 진행되고 있다. 본 논문에서는 다중 채널 무선 네트워크에서의 QoS 보장을 위하여 Cognitive Radio 기반의 동적인 스펙트럼 할당 (Dynamic Spectrum Allocation)을 이용한 새로운 MAC 프로토콜을 제안한다. 사용자의 요청에 따라서, 유동적인 스펙트럼은 DSA 메커니즘을 통한 QoS 보장을 위하여 할당 된다. 그리고 동적인 스펙트럼 할당 (DSA)은 컨트롤 채널의 FRQ/FRP/ACK-hello와 데이터 채널의 DATA/ACK에 의하여 동작한다. 스펙트럼 공유의 성능을 증가시키기 위한 협력 검출 (Cooperative Detection)을 위하여, MAC 프로토콜에서는 Hello 메시지가 주기적으로 교환된다. 추가적으로, 성능 평가를 통하여 본 논문에서 제안한 DSA-MAC이 IEEE 802.11 MAC에 비하여 높은 데이터 처리량을 보임을 증명했다.

  • PDF

A CORDIC-Jacobi Based Spectrum Sensing Algorithm For Cognitive Radio

  • Tan, Xiaobo;Zhang, Hang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.1998-2016
    • /
    • 2012
  • Reliable spectrum sensing algorithm is a fundamental component in cognitive radio. In this paper, a non-cooperative spectrum sensing algorithm which needs only one cognitive radio node named CORDIC (Coordinate Rotation Digital Computer) Jacobi based method is proposed. The algorithm computes the eigenvalues of the sampled covariance of received signal mainly by shift and additional operations, which is suitable for hardware implementation. Based the latest random matrix theory (RMT) about the distribution of the limiting maximum and minimum eigenvalue ratio, the relationship between the probability of false alarm and the decision threshold is derived. Simulations and discussions show the method is effective. Real captured digital television (DTV) signals and Universal Software Radio Peripheral (USRP) are also employed to evaluate the performance of the algorithm, which prove the proposed algorithm can be applied in practical spectrum sensing applications.

Cooperative Spectrum Sensing using Kalman Filter based Adaptive Fuzzy System for Cognitive Radio Networks

  • Thuc, Kieu-Xuan;Koo, In-Soo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.287-304
    • /
    • 2012
  • Spectrum sensing is an important functionality for cognitive users to look for spectrum holes before taking transmission in dynamic spectrum access model. Unlike previous works that assume perfect knowledge of the SNR of the signal received from the primary user, in this paper we consider a realistic case where the SNR of the primary user's signal is unknown to both fusion center and cognitive radio terminals. A Kalman filter based adaptive Takagi and Sugeno's fuzzy system is designed to make the global spectrum sensing decision based on the observed energies from cognitive users. With the capacity of adapting system parameters, the fusion center can make a global sensing decision reliably without any requirement of channel state information, prior knowledge and prior probabilities of the primary user's signal. Numerical results prove that the sensing performance of the proposed scheme outperforms the performance of the equal gain combination based scheme, and matches the performance of the optimal soft combination scheme.

Joint Beamforming and Power Splitting Design for Physical Layer Security in Cognitive SWIPT Decode-and-Forward Relay Networks

  • Xu, Xiaorong;Hu, Andi;Yao, Yingbiao;Feng, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.1-19
    • /
    • 2020
  • In an underlay cognitive simultaneous wireless information and power transfer (SWIPT) network, communication from secondary user (SU) to secondary destination (SD) is accomplished with decode-and-forward (DF) relays. Multiple energy-constrained relays are assumed to harvest energy from SU via power splitting (PS) protocol and complete SU secure information transmission with beamforming. Hence, physical layer security (PLS) is investigated in cognitive SWIPT network. In order to interfere with eavesdropper and improve relay's energy efficiency, a destination-assisted jamming scheme is proposed. Namely, SD transmits artificial noise (AN) to interfere with eavesdropping, while jamming signal can also provide harvested energy to relays. Beamforming vector and power splitting ratio are jointly optimized with the objective of SU secrecy capacity maximization. We solve this non-convex optimization problem via a general two-stage procedure. Firstly, we obtain the optimal beamforming vector through semi-definite relaxation (SDR) method with a fixed power splitting ratio. Secondly, the best power splitting ratio can be obtained by one-dimensional search. We provide simulation results to verify the proposed solution. Simulation results show that the scheme achieves the maximum SD secrecy rate with appropriate selection of power splitting ratio, and the proposed scheme guarantees security in cognitive SWIPT networks.

Development of a Machining System Adapted Autonomously to Disturbances (장애 자율 대응 가공 시스템 개발)

  • Park, Hong-Seok;Park, Jin-Woo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.29 no.4
    • /
    • pp.373-379
    • /
    • 2012
  • Disruptions in manufacturing systems caused by system changes and disturbances such as the tool wear, machine breakdown, malfunction of transporter, and so on, reduce the productivity and the increase of downtime and manufacturing cost. In order to cope with these challenges, a new method to build an intelligent manufacturing system with biological principles, namely an ant colony inspired manufacturing system, is presented. In the developed system, the manufacturing system is considered as a swarm of cognitive agents where work-pieces, machines and transporters are controlled by the corresponding cognitive agent. The system reacts to disturbances autonomously based on the algorithm of each autonomous entity or the cooperation with them. To develop the ant colony inspired manufacturing system, the disturbances happened in the machining shop of a transmission case were analyzed to classify them and to find out the corresponding management methods. The system architecture with the autonomous characteristics was generated with the cognitive agent and the ant colony technology. A test bed was implemented to prove the functionality of the developed system.

Throughput Maximization for Cognitive Radio Users with Energy Constraints in an Underlay Paradigm

  • Vu, Van-Hiep;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.2
    • /
    • pp.79-84
    • /
    • 2017
  • In a cognitive radio network (CRN), cognitive radio users (CUs) should be powered by a small battery for their operations. The operations of the CU often include spectrum sensing and data transmission. The spectrum sensing process may help the CU avoid a collision with the primary user (PU) and may save the energy that is wasted in transmitting data when the PU is present. However, in a time-slotted manner, the sensing process consumes energy and reduces the time for transmitting data, which degrades the achieved throughput of the CRN. Subsequently, the sensing process does not always offer an advantage in regards to throughput to the CRN. In this paper, we propose a scheme to find an optimal policy (i.e., perform spectrum sensing before transmitting data or transmit data without the sensing process) for maximizing the achieved throughput of the CRN. In the proposed scheme, the data collection period is considered as the main factor effecting on the optimal policy. Simulation results show the advantages of the optimal policy.

Bit Error Rate of Underlay Decode-and-Forward Cognitive Networks with Best Relay Selection

  • Ho-Van, Khuong;Sofotasios, Paschalis C.;Alexandropoulos, George C.;Freear, Steven
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.162-171
    • /
    • 2015
  • This paper provides an analytic performance evaluation of the bit error rate (BER) of underlay decode-and-forward cognitive networks with best relay selection over Rayleigh multipath fading channels. A generalized BER expression valid for arbitrary operational parameters is firstly presented in the form of a single integral, which is then employed for determining the diversity order and coding gain for different best relay selection scenarios. Furthermore, a novel and highly accurate closed-form approximate BER expression is derived for the specific case where relays are located relatively close to each other. The presented results are rather convenient to handle both analytically and numerically, while they are shown to be in good agreement with results from respective computer simulations. In addition, it is shown that as in the case of conventional relaying networks, the behaviour of underlay relaying cognitive networks with best relay selection depends significantly on the number of involved relays.

Energy Efficiency Optimization for multiuser OFDM-based Cognitive Heterogeneous networks

  • Ning, Bing;Zhang, Aihua;Hao, Wanming;Li, Jianjun;Yang, Shouyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.2873-2892
    • /
    • 2019
  • Reducing the interference to the licensed mobile users and obtaining the energy efficiency are key issues in cognitive heterogeneous networks. A corresponding rate loss constraint is proposed to be used for the sensing-based spectrum sharing (SBSS) model in cognitive heterogeneous networks in this paper. Resource allocation optimization strategy is designed for the maximum energy efficiency under the proposed interference constraint together with average transmission power constraint. An efficiency algorithm is studied to maximize energy efficiency due to the nonconvex optimal problem. Furthermore, the relationship between the proposed protection criterion and the conventional interference constraint strategy under imperfect sensing condition for the SBSS model is also investigated, and we found that the conventional interference threshold can be regarded as the upper bound of the maximum rate loss that the primary user could tolerate. Simulation results have shown the effectiveness of the proposed protection criterion overcome the conventional interference power constraint.