Printer Friendly

A novel definition of spectrum holes for improved spectrum utilization efficiency.

1. Introduction

Radio frequency spectrum is a precious resource for wireless communication systems. With the rapid development of wireless communication services, there is an increasing demand for spectrum. Existing static spectrum allocations policies have resulted in the low utilization of spectrum [1-4]. The dynamic spectrum access (DSA) policy is proposed as an alternative to efficiently use radio spectrum [5-8]. In DSA, portions of the spectrum are allocated to one or more users, known as primary users (PUs). Spectrum use is not exclusively granted to these users, although they have a higher priority. Other users, referred to as secondary users (SUs), can also access the allocated spectrum, provided the PUs are properly protected. By doing so, the radio spectrum is reused opportunistically, thereby significantly improving the spectrum utilization [5-8].

Cognitive radio (CR) technology is an important means to realize DSA. Users with I cognitive functions can sense the spectrum environment using intelligent means. They can automatically search and use available spectrum, thereby realizing authorized spectrum sharing [5-8]. In [9], a spectrum hole is defined as a (time, location, frequency-band)-tuple that a secondary user can use, while maintaining interference with all primary systems within an acceptable level.

In order to reuse the spectrum, a secondary user must be able to reliably identify a spectrum hole. In the above definition of a spectrum hole, the key factor is the impact of SUs on PUs. For a temporal spectrum hole, the impact refers to the probability when PUs and SUs simultaneously use the same spectrum. This has been referred to as the collision probability [10]. The collision probability ignores the position relationship between SUs and PUs, which is essential for exploiting spatial spectrum opportunities. For a spatial spectrum hole, this impact refers to power which is received by primary receriver from secondary transmitters, referred to as interference [11-13]. It alternately refers to the outage probability of the primary receiver, which is a function of the interference. The interference and the outage probability only reflect the intensity of the interfering signal. They does not reflect the duration of the interference. It also cannot fully reflect the impact of SUs on PUs. In [14], the Bayesian risk function was minimized by selecting the sensing threshold. This was a tradeoff between the risk of collision probability and secondary users losing communication opportunity. This tradeoff exploited both the temporal and spatial spectrum opportunity, and greatly improved the spectrum utilization. However, it lacks a theoretical basis. In [15], a three-region scheme for space-time spectrum sensing and access was designed with one primary transmitter at the center. This includes the black, grey, and white region. However, the authors have not jointly considered the interference and collision probability, as above, which doesn't fully reflect the impact of SUs on PUs.

In this paper, the average throughput loss percentage (hereafter referred to as throughput loss) of the PUs reflects the impact of SUs on PUs. The throughput loss is a comprehensive indicator, which contains the collision probability and intensity of interference. It unifies the impact of SUs on PUs in the spatial-temporal spectrum holes. Considering the throughput loss improves the spectrum utilization. In addition, the throughput loss is more intuitive, compared to Bayesian risk criteria. In this paper we design networks and channel models. Through theoretical analysis and numerical simulations, it is shown that the throughput loss is a more effective impact indicator than conventional indicators (e.g., collision probability, interference, and Bayesian risk) in terms of spectrum utilization.

The remainder of this paper is organized as follows. In section 2, we propose the spectrum holes definition with throughput loss as an impact indicator. In section 3, we introduce the networks and channel models to verify the definition. In section 4, we derive the optimal scheme of spectrum hole utilization in the models. In section 5, this definition is compared to conventional definitions of spectrum holes. In section 6, the numerical simulations and analysis are presented. In section 7, we conclude this research.

2. Spectrum Holes Definition

The definition of spectrum holes determines how to detect and exploit them. In this definition, the impact of SUs on PUs is a key factor. Conventional definitions of spectrum holes have many shortcomings. In this section, we first define spectrum holes with throughput loss as an impact indicator.

The average throughput loss percentage of PUs indicates the impact of SUs on PUs as

k = [[T.sup.max.sub.p] - [T.sup.ave.sub.p]]/[T.sup.max.sub.p] ? 100% (1)

where [T.sup.max.sub.p] is the maximum average throughput of PUs and [T.sup.ave.sub.p] is the average throughput of PUs. This can be predicted through channel models, provided a secondary transmitter (ST) is used.

The proposed definition of a spectrum holes is as follows: Definition: a spectrum hole is defined as a (time, location, frequency-band)-tuple that a secondary user can use, while maintaining the throughput loss to all primary users in the specified frequency band within an acceptable level.

Choosing a suitable value for k is important. In a practical system, PUs cannot always work at the maximum average throughput. There is spare throughput against all kinds of interference. We choose a suitable value for k to guarantee QoS of the PUs and make the SUs attain the maximum throughput.

3. Network and Channel Models

3.1 Networks Model

As shown in Fig. 1, we consider a network model consisting of a pair of fixed PUs (including a primary transmitter (PT) and a primary receiver (PR)) and a pair of SUs (including a secondary transmitter (ST) and a secondary receiver (SR)). The SUs opportunistically exploit a spectrum band licensed to the PUs. Assume that the PUs are rate-adaptive digital communication systems, and occupy the spectrum band with a probability q.

In Fig. 1, PT is located in the origin of coordinates. The coordinates of PR, ST, and SR are labeled in the respective brackets. The angle between the communication direction from ST to SR and the X-axis is f. The angle between the communication direction from PT to PR and the X-axis is q. r is the distance from PT to ST. [r.sub.p] and [r.sub.s] denote the communication distance of the PUs and SUs, respectively. [d.sub.ps] denotes the distance from PT to SR. [d.sub.sp] denotes the distance from ST to PR.

[d.sub.ps] = [square root of ([r.sup.2] + [r.sup.2.sub.s] + 2r[r.sub.s] cos f)] (2)

[d.sub.sp] = [square root of ([r.sup.2] + [r.sup.2.sub.p] - 2r[r.sub.p] cos q)] (3)

In Fig. 1, the circles with radius dare the protected regions. Any active transmitter cannot be inside this region, to exclude the possibility that the receive signal and interference power reaches infinity. It's worth noting that the protected region of ST is used to exclude the possibility that the sensing receive power reaches infinity.

3.2 Channel Model

Consider a wireless channel model with both large-scale path loss and small-scale fading. Free-space path loss, [h.sub.PL], models the average power changing with distance. Rayleigh fading [h.sub.FD] is adopted for small-scale variation. The channel model between any Tx-Rx pair can then be written as follows:

h = [h.sub.PL] ?[h.sub.FD] (4)

where [h.sub.FD] ~ CN(0, 1) is a complex circular Gaussian random variable with independent real and imaginary parts with equal variance; and

[h.sub.PL] = A/[r.sup.a/2] (5)

where A is a constant dependent upon the frequency and transmitter/receiver antenna gain, r is the distance between the Tx-Rx pair, and a is the path loss exponent. Without loss of generality, we normalize A = 1 for simplicity and consider [a.sup.3] 2, which is typical in practical applications.

3.3 Signal and Sensing Models

To sense the primary transmission, ST must perform a hypothesis test between the following two hypotheses: [H.sub.0] (primary signal absent) and [H.sub.1] (primary signal present). This test is conducted as follows:

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (6)

where N is the number of samples, y(i) is the received samples at ST, x(i) [] CN(0, [S.sup.2.sub.x]) is the signal received at ST from PT after path loss and fading, and W(i) is assumed to be a circularly-symmetric complex Gaussian random variable with mean zero and one-sided power spectral density [S.sup.2.sub.w], namely, w(i) [] CN(0, [S.sup.2.sub.w]). Based on the channel model in (4), [S.sup.2.sub.x] = [P.sub.p][h.sup.2.sub.PL]d where [P.sub.p] is transmit power of PT. The primary signal x(i) is independent of the noise W(i).

The decision statistic is [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. The probabilities of miss detection [p.sub.m] = Pr {[H.sub.0] / [H.sub.1]} and false alarm [p.sub.f] = Pr {[H.sub.1] / [H.sub.0]} are [16]:

[p.sub.m] (e, N) = Q((g + 1 - e/[s.sup.2.sub.w])[square root of (N/2d + 1)]) (7)

[p.sub.f] (e, N) = Q((e/[s.sup.2.sub.w] - 1)[square root of (N)]) (8)

where g is the signal to noise ratio (SNR) at ST, g = [P.sub.p][r.sup.-a][s.sup.-2.sub.w] in the above channel model, and e is the decision threshold. Q(x) = 1/2p [[??].sub.x.sup.[yen]] exp(- [t.sup.2/2))dt is the tail probability of the standard normal distribution.

4. Optimization of Spatial-Temporal Spectrum

4.1 Channel States

In DSA, for a temporal spectrum hole, SUs cannot simultaneously operate in the same channel with the PUs. Collision between the SUs and PUs may only occur due to sensing errors. But for a spatial-temporal spectrum hole, we allow for it if the distance from PR is far enough. So, we model the spectrum access process as a four-state process, where state 0 means no user operates in the channel. State 1 means the PUs operate in the channel. State 2 means the SUs operate in the channel. State 3 means both the PUs and the SUs operate in the channel. The channel state set is S [] {0, 1, 2, 3}. It is assumed that PUs occupy the spectrum band with a probability q and SUs opportunistically occupy it. The probability in every channel state is, respectively:

[P.sub.0] = (1 - q)[p.sub.f] (9)

[P.sub.1] = q(1 - [p.sub.m]) (10)

[P.sub.2] = (1 - q)(1 - [p.sub.f]) (11)

[P.sub.3] = q[p.sub.m] (12)

4.2 Throughput Achieved in Every Channel State

In the system models described above, we assume the bandwidth is 1Hz. As the network model only consists of a pair of PUs and SUs, we replace the throughput with channel capacity [17]. The throughput of the PUs achieved in state1 is

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (13)

The throughput of the SUs achieved in state2 is

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (14)

where [S.sup.2.sub.w] is power of the additive white Gaussian noise (AWGN), [P.sub.p] is the transmission power for the PUs, and [P.sub.s] is the transmission power for the SUs.

We assume that the SUs and PUs can vary their data rate through a combination of adaptive modulation and coding. This allows the transmitter and receiver to employ the most reliable communication at the highest rate permitted, given the signal-to-interference-plus-noise ratio (SINR).We assume that they use random Gaussian codebooks. As a result, their transmitted signals can be treated as white Gaussian processes. The transmission of other users is treated as Gaussian noise. The maximal rate of users when the secondary user and the primary user share the spectrum can be represented as follows:

The throughput of the SUs achieved in state3 is

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (15)

The throughput of the PUs achieved in state3 is

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (16)

4.3 Optimization of Spatial-Temporal Spectrum for Proposed Definition

The average throughput of the SUs is

[T.sub.s] = [P.sub.2][R.sup.s.sub.2] + [P.sub.3][R.sup.s.sub.3] = (1 - q)(1 - [p.sub.f])[R.sup.s.sub.2] + q[p.sub.m][R.sup.s.sub.3] (17)

The average throughput of the PUs is

[T.sup.ave.sub.p] = [P.sub.1][R.sup.p.sub.1] + [P.sub.3][R.sup.p.sub.3] = q[R.sup.p.sub.1] = q[p.sub.m] ([R.sup.p.sub.1] - [R.sup.p.sub.3]) (18)

The maximum average throughput of the PUs is [T.sup.max.sub.p] = q[R.sup.p.sub.1].

Maximizing the available spatial-temporal spectrum opportunity using the spectrum holes definition in this paper can be formulized as follows:

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (19)

Subject to: q[R.sup.p.sub.1] - q[p.sub.m]([R.sup.p.sub.1] - [R.sup.p.sub.1]) ? (1 k)q[R.sup.p.sub.1] (20)

where 0 #k 1 is a scaling factor that denotes the maximum average throughput loss ratio that is acceptable for PUs due to interference of the SUs. We first introduce the following proposition to solve this problem:

Proposition 1: [p.sub.f] is a decreasing function of [p.sub.m].

Proof : According to (7) and (8), we can obtain:

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (21)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (22)

d[p.sub.f]/d[p.sub.m] = d[p.sub.f]/d e ? d e/d[p.sub.m] 0 (23)

Therefore [p.sub.f] is a decreasing function of [p.sub.m]. Proposition 1 is proved.

The objective function in equation (19) is a decreasing function of [p.sub.f].

We can obtain from the constraint condition (20):

[p.sub.m] ? k[R.sup.p.sub.1][([R.sup.p.sub.1] [R.sup.p.sub.3]).sup.-1] = [p.sup.*.sub.m] (24)

where [p.sup.*.sub.m] denotes the optimal miss detection probability. Because [p.sub.m] is a decreasing function of [p.sub.f], the optimal false alarm probability is:

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (25)

It is worth noting that k[R.sup.p.sub.1] [([R.sup.p.sub.1] - [R.sup.p.sub.3]).sup.-1] > 1 can occur when r is large enough. However, miss detection probability is not greater than 1. In this case, we order [p.sup.*.sub.m] = 1 and [p.sup.*.sub.f] = 0 to maximize the SUs throughput.

The maximum average throughput of the SUs is:

(1 - q)(1 - [p.sup.*.sub.f])[R.sup.s.sub.2] + q[p.sup.*.sub.m][R.sup.s.sub.3] (26)

5. Comparison of the Proposed and Conventional Definitions

As stated in the introduction, the interference only reflects the intensity of the interfering signal. It does not reflect the duration of the interference signal. So, it cannot fully reflect the impact of SUs on PUs. We only consider the definition based on the collision probability constraint and the Bayesian risk in this section.

5.1 Comparison to the Collision Probability Constraint

We maximize the available spatial-temporal spectrum using the spectrum holes definition as follows [10]:

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (27)

Subject to: [p.sub.m] [??] [[bar.p].sub.m] (28)

where [[bar.p].sub.m] is the minimum miss detection probability. The inequality (28) constrains the collision probability between the PUs and the SUs. We easily obtain the optimal false alarm probability to maximize the SUs throughput as follows:

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (29)

The maximum average throughput of the SUs is:

(1 - q)(1 - [[bar.p].sub.f])[R.sup.2.sub.2] + q[[bar.p].sub.m][R.sup.s.sub.3] (30)

In this case, the maximum value of k is:

[k.sub.m] = [[bar.p].sub.m] (R.sup.p.sub.1] - [R.sup.p.sub.3min])/[R.sup.p.sub.1] (31)

where [R.sup.p.sub.3min] is the minimum value of [R.sup.p.sub.3] in the case of [d.sub.sp] = max([r.sub.p] [absolute value sin q], d).

Substituting [k.sub.m] into (24), we obtain

[[??].sup.*.sub.m] = [[bar.p].sub.m]([R.sup.p.sub.1] - [R.sup.p.sub.3min])[([R.sup.p.sub.1] - [R.sup.p.sub.3].sup.-1] (32)

Substituting (32) into (26), we obtain the maximum average throughput of the SUs in the case of k = [k.sub.m] in the proposed definition:

(1 - q)(1 - [[??].sup.*.sub.f])[R.sup.s.sub.2] + q[[??].sup.*.sub.m][R.sup.s.sub.3] (33)

where [[??].sup.*.sub.f] is obtained by substituting [p.sup.*.sub.m] = [[??].sup.*.sub.m] into (25).

Subtracting (30) from (33), we obtain the following:

([[bar.p].sub.f] - [[??].sup.*.sub.f](1 - q)[R.sup.s.sub.2] + ([[??].sup.*.sub.m] - [[bar.p].sub.m])q[R.sup.s.sub.3] (34)

It is easy to prove (34) is greater than zero. That is, the definition of spectrum holes based on the throughput loss is more advantageous than the one based on the collision probability constraint in terms of spectrum utilization.

The traditional scheme uses (29), while the proposed scheme uses (25). The computing complexity of the proposed scheme is not much higher than that of the traditional scheme. However, the overhead in the proposed scheme is more than the traditional schemes due to the information required to transmit. The additional overhead is limited in small-scale network.

5.2 Comparison to the Bayesian Criteria

Using Bayesian criterion, the optimization objective is defined as a risk function involving the miss detection and false alarm probabilities as follows [14]:

R = b([I.sub.ps] + [I.sub.sp])q[p.sub.m](e) + [L.sub.s](1 - q)[p.sub.f] (e) (35)

where [I.sub.ps] is the interference power from the PT to the SR, [I.sub.sp] is the interference power from the ST to the PR, and [L.sub.s] is the signal power received by the SR. Both [p.sub.m] and [p.sub.f] are a function of the detection threshold e. [b.sup.3] 1 is the penalty parameter to place a higher priority on the PUs link.

The sensing threshold is designed to minimize the risk in the different cases of location information:

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (36)

and

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (37)

Substituting (31) and (32) into (36), we obtain

[e.sup.2] - [s.sup.2.sub.w]e - C = 0 (38)

where

C = g[s.sup.4.sub.w] / 2 + (2g + 1)[s.sup.4.sub.w] ln [L.sub.s](1 - q)[square root of (2g + 1)]/b([I.sub.ps] + [I.sub.sp]) (39)

We obtain the optimal detection threshold:

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (40)

Substituting [e.sup.*] into (7) and (8), we obtain [p.sub.m]([e.sup.*]) and [p.sub.f] ([e.sup.*]). From (17), we obtain the optimal throughput of the SUs.

The traditional scheme uses (40), while the proposed scheme uses (25). The computing complexity of the proposed scheme is not much higher than the traditional scheme. Additionally, the overhead in the proposed scheme is nearly equivalent to the traditional schemes, as both needs to transmit more information.

6. Numerical Simulation and Analysis

Numerical simulations in Fig. 2, Fig. 3, and Fig. 4 were conducted using the conditions described in Table 1.

Fig. 2 shows that the throughput of the SUs for different definitions varies with the distance, r. It is worth noting the selection of the throughput loss percentage of PUs, k. Let the penalty parameter b = 1. We obtain the optimal threshold [e.sup.*] from (40). We then obtain [p.sub.m]([e.sup.*]) and [p.sub.f]([e.sup.*]) from (6) and (7). By substituting them into (17) we obtain the throughput of the SUs. At the same time, we calculate the throughput loss percentage k. With r varying from 0.1m to 20m, we select the maximum value of k as the throughput loss percentage. The throughput of the SUs is optimized as described in section 4.3, with the maximum value of k. [[bar.p].sub.m] is obtained from (31). The throughput of the SUs is optimized as described in section 5.1 using [[bar.p].sub.m].

Fig. 2 shows that the throughput of the SUs for the proposed definition is greater than that of the definitions in [10] and [14]. As r increases, the advantage of the proposed definition is more obvious compared to other definitions. This is because the definition in [10] is for temporal spectrum holes. However, as r increases, the SNR decreases. The false probability increases to satisfy the relatively small collision probability. As a result, the SUs lose spatial spectrum. When r > 10, the throughput sharply decreases. However, for the definition in [14] and the proposed definition, the SUs utilize both temporal and spatial spectrum holes. As r increases, the influence of ST on the PR decreases. We increase the collision probability [P.sub.3] to utilize more spatial spectrum opportunity. There is obvious improvement in the throughput of the SUs. In [14], the optimization objective is a risk function R, not the throughput of SUs. Therefore, compared with the Bayesian criterion, the throughput of the SUs increases significantly with the proposed definition.

Fig. 3 shows the throughput of SUs for different definitions varies with the probability q As shown, the throughput of the SUs for all definitions decreases as q increases. This is because the increase in q results in less temporal spectrum holes for SUs to utilize. In this process, the throughput for the proposed definition decreases less than that of the other definitions. This is because, in the case of r = 12, the SUs mainly utilize spatial spectrum holes.

Fig. 4 shows the throughput of SUs for different definitions with various numbers of samples N. It is shown that the throughput of the SUs for all definitions vary as N increases. For the proposed definition, it nearly remains unchanged. For the definition in [10], the throughput increases. However, for the definition in [14], it decreases. This shows that the proposed definition is insensitive to sensing accuracy.

7. Conclusion

In this paper, throughput loss is used to indicate the impact of SUs on PUs. This specifies the definition of spectrum holes, and unifies the impact of SUs on PUs in the spatial-temporal spectrum holes. In a typical cognitive radio system, theoretical analysis and numerical simulations show that, when compared to previous definitions of spectrum holes, the proposed definition significantly improves the spectrum utilization, and is insensitive to sensing accuracy.

http://dx.doi.org/10.3837/tiis.2014.03.002

References

[1] Federal Commun. Comm., Spectrum Policy Task Force Report, Washington, DC, ET Docket No. 02-135, Nov. 2002. http://www.fcc.gov/sptf

[2] M.Islam, C. Koh, S. Oh, X. Qing, Y. Lai, C. Wang, Y.-C. Liang, B. Toh, F. Chin, G. Tan, and W. Toh, "Spectrum survey in Singapore: Occupancy measurements and analysis," in Proc. of 3rd Int. Conf. CROWNCOM, pp. 1-7, May 2008. http://www.pwtc.eee.ntu.edu.sg/News/Documents/Spectrum%20survey%20in%20Singapore_%20Occupancy%20measurements%20and%20an alyses.pdf

[3] D. Datla, A. M. Wyglinski, G. J. Minden, "A spectrum surveying framework for dynamic spectrum access networks," IEEE Trans. Veh. Technol., vol. 58, no. 8, pp. 4158-4168, Oct. 2009. http://dx.doi.org/10.1109/TVT.2009.2021601

[4] Y.Xu, A. Anpalagan, Q.Wu, et al., "Decision-theoretic distributed channel selection for opportunistic spectrum access: Strategies, challenges and solutions," IEEE Communications Surveys and Tutorials, to be published. http://dx.doi.org/10.1109/SURV.2013.030713.00189

[5] J. Mitola, G. Q. Maguire, "Cognitive radio: Making software radios more personal," IEEE Pers. Commun., vol. 6, no. 4, pp. 13-18, Aug. 1999. http://dx.doi.org/10.1109/98.788210

[6] J. Mitola, "Cognitive radio--An integrated agent architecture for software-defined radio," Ph.D. dissertation, Roy. Inst. Technol., Stockholm, Sweden, May, 2000. http://web.it.kth.se/~maguire/jmitola/Mitola_Dissertation8_Integrated.pdf

[7] Y.Xu, J. Wang, Q. Wu, et al, "Opportunistic spectrum access in cognitive radio networks: Global optimization using local interaction games," IEEE Journal of Selected Topics in Signal Processing, vol. 6, no. 2, pp. 180-194, 2012. http://dx.doi.org/10.1109/JSTSP.2011.2176916

[8] Y. Xu, J. Wang, Q. Wu, et al, "Opportunistic spectrum access in unknown dynamic environment: A game-theoretic stochastic learning solution," IEEE Transactions on Wireless Communications, vol. 11, no. 4, pp. 1380-1391, 2012. http://dx.doi.org/10.1109/TWC.2012.020812.110025

[9] R. Tandra, M. Mishra, A. Sahai, "What is a spectrum hole and what does it take to recognize one?" Proc. IEEE, vol. 97, no. 5, pp. 824-848, May 2009. http://dx.doi.org/10.1109/JPROC.2009.2015710

[10] G.Ding, Q.Wu, F.Song, et al, "Joint exploration and exploitation of spatial-temporal spectrum hole for cognitive vehicle radios," in Proc. of IEEE ICSPCC. Conf., pp. 1-4, Sep. 2011. http://ieeexplore.ieee.org/xpls/abs_all.jsp?amumber=6061606

[11] V. Mai, N. Devroye, V. Tarokh, "On the primary exclusive region of cognitive networks," IEEE Transactions on Wireless Communications, vol. 8, pp. 3380-3385, 2009. http://dx.doi.org/10.1109/TWC.2009.080454

[12] Q Wu, G Ding, J Wang, Y Yao, "Spatial-temporal opportunity detection for spectrum heterogeneous cognitive radio networks: Two-dimensional sensing," IEEE Transactions on Wireless Communications, vol. 12, no.2, pp. 516-526, Feb. 2013. http://dx.doi.org/10.1109/TWC.2012.122212.111638

[13] G Ding, J Wang, Q Wu, F Song, Y Chen, "Spectrum Sensing in Opportunity-Heterogeneous Cognitive Sensor Networks: How to Cooperate?" IEEE Sensors Journal, 2013. http://dx.doi.org/10.1109/JSEN.2013.2264161

[14] P. Jia, M. Vu, T. Le-Ngoc. S.-C. Hong, and T. Basar, "Capacity-and Bayesian-based cognitive sensing with location side information," IEEE Journal on Selected Areas in Communications, vol. 29, pp. 276-289, Feb. 2011. http://dx.doi.org/10.1109/JSAC.2011.110202

[15] Z. Wei, Z. Feng, Q. Zhang, W. Li, "Three regions for space-time spectrum sensing and access in cognitive radio networks," IEEE Global Communications Conference, pp. 1283-1288, 2012. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6503290

[16] Y.-C. Liang, Y. Zeng, ECY Peh, and AT Hoang, "Sensing- Throughput Tradeoff for Cognitive Radio Networks," IEEE Transactions on Wireless Communications, vol. 7, pp. 1326-1337, Apr. 2008. http://dx.doi.org/10.1109/TWC.2008.060869

[17] T. M. Cover and J. A. Thomas, Elements of Information Theory. New York: Wiley-Interscience, 1990. http://jpkc2010.nudt.edu.cn/xxlybmjc/jishuwenxian/wenxian/Elements%20%20of%20%20Information.PDF

This work was supported by National Fundament Research of China (973 No. 2009CB302403) and China national natural science foundation under grant (NO. 61231011).

Xiaoqiang Li (1), Qi Zhou (2), Hui Dai (2), Jie Zhang (2) and Ying Li (2)

(1) College of Communications Engineering, PLA University of Science and Technology. No.2 Biaoying, Yudao Street, 210007, Nanjing--China

[e-mail: lxq123lxq@yahoo.com.cn]

(2) Institute of China Electronic System Engineering Corporation No.13 Dacheng Road, Fengtai District, 100141, Beijing-China

[e-mail: 592518366@qq.com, alex_todai@163.com, 13488811127@163.com, jeccyly@163.com]

* Corresponding author: Xiaoqiang Li

Received July 9, 2013; revised September 10, 2013; revised November 10, 2010; accepted November 29, 2013; published March 31, 2014

Xiaoqiang Li received the B. S. degree and the M. S. degree both from PLA University of Science and Technology, Nanjing, China in 1997 and 2007 respectively. He is currently pursuing for the Ph. D degree in Communications and Information System at the Institute of Communications Engineering, PLA University of Science and Technology, Nanjing, China. His current research interests include cognitive radio technology and digital communications.

Qi Zhou received the B. S. degree from PLA University of Science and Technology, Nanjing, China in 1997 and the M. S. degree from Tsinghua University, Beijing, China in 2005. He is now a senior engineer in research institute. His working is concerned with wireless communication and networks.

Hui Dai received his doctor degree in 2008 at PLA University of Science and Technology, Nanjing, China. He is currently an engineer in Institute of China Electronic System Engineering Corporation. His research focuses on wideband mobile communication technologies including MIMO, link adaptation, cooperative transmission technologies.

Jie Zhang received the Ph.D. degree from Naval Aeronautical Engineering University Yantai, China in 2006. He is now a senior engineer at Beijing institute of electronic system engineering. His research interests include command and control system, effectiveness evaluation, cognitive radio.

Ying Li received her B.S. and Ph. D degree in 2001 and 2006 respectively from National University of Defense Technology, Changsha, Hunan, all in communication engineering. From 2007, she is a research member in Institute of China Electronic System Engineering Company, Beijing. Her research interests include wireless network protocol and signal processing in communications, more specially, the areas of Multicarrier transmission, MIMO and cognitive radio.

Table 1. the Parameters and Their Value in the Following
Numerical Simulations

Parameter                   Physical Meaning             Value in Fig.
                                                               2

N                  the number of samples                      20

r                  distance from PT to ST                   0.1~20m

q                  the probability that the PUs occupy        0.4
                   the authorized spectrum band

q                  angle between the communication        90[degrees]
                   direction from PT to PR and X-axis

f                  angle between the communication        0[degrees]
                   direction from ST to SR and X-axis

[s.sup.2.sub. W]   one-sided power spectral density       0.0001W/Hz

a                  the pathloss exponent                      4.2

[P.sub.p]          transmission power of PT                   1W

[r.sub.p]          communication distance of the PUs          8m

[P.sub.s]          transmission power of ST                  0.5W

[r.sub.s]          communication distance of the SUs          4m

d                  radius of protected region                0.1m

Parameter          Value in Fig.   Value in Fig.
                         3               4

N                       20            10~160

r                       12m             13m

q                     0.1~0.9           0.4

q                   90[degrees]     90[degrees]

f                   0[degrees]      0[degrees]

[s.sup.2.sub. W]    0.0001W/Hz      0.0001W/Hz

a                       4.2             4.2

[P.sub.p]               1W              1W

[r.sub.p]               8m              8m

[P.sub.s]              0.5W            0.5W

[r.sub.s]               4m              4m

d                      0.1m            0.1m
COPYRIGHT 2014 KSII, the Korean Society for Internet Information
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2014 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Author:Li, Xiaoqiang; Zhou, Qi; Dai, Hui; Zhang, Jie; Li, Ying
Publication:KSII Transactions on Internet and Information Systems
Article Type:Report
Date:Mar 1, 2014
Words:5087
Previous Article:Practical swarm optimization based fault-tolerance algorithm for the Internet of Things.
Next Article:FaST: Fine-grained and Scalable TCP for cloud data center networks.
Topics:

Terms of use | Privacy policy | Copyright © 2019 Farlex, Inc. | Feedback | For webmasters