• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 178
  • 28
  • 23
  • 20
  • 6
  • 6
  • 6
  • 2
  • 2
  • 1
  • Tagged with
  • 370
  • 370
  • 164
  • 146
  • 96
  • 83
  • 71
  • 59
  • 52
  • 51
  • 46
  • 44
  • 44
  • 43
  • 42
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Hardware and software for WINC2R cognitive radio platform

Jain, Shalini. January 2008 (has links)
Thesis (M.S.)--Rutgers University, 2008. / "Graduate Program in Electrical and Computer Engineering." Includes bibliographical references (p. 59-60).
62

Performance analysis of spectrum sensing techniques for future wireless networks

He, Yibo January 2017 (has links)
In this thesis, spectrum sensing techniques are investigated for cognitive radio (CR) networks in order to improve the sensing and transmission performance of secondary networks. Specifically, the detailed exploration comprises of three areas, including single-node spectrum sensing based on eigenvalue-based detection, cooperative spectrum sensing under random secondary networks and full-duplex (FD) spectrum sensing and sharing techniques. In the first technical chapter of this thesis, eigenvalue-based spectrum sensing techniques, including maximum eigenvalue detection (MED), maximum minimum eigenvalue (MME) detection, energy with minimum eigenvalue (EME) detection and the generalized likelihood ratio test (GLRT) eigenvalue detector, are investigated in terms of total error rates and achievable throughput. Firstly, in order to consider the benefits of primary users (PUs) and secondary users (SUs) simultaneously, the optimal decision thresholds are investigated to minimize the total error rate, i.e. the summation of missed detection and false alarm rate. Secondly, the sensing-throughput trade-off is studied based on the GLRT detector and the optimal sensing time is obtained for maximizing the achievable throughput of secondary communications when the target probability of detection is achieved. In the second technical chapter, the centralized GLRT-based cooperative sensing technique is evaluated by utilizing a homogeneous Poisson point process (PPP). Firstly, since collaborating all the available SUs does not always achieve the best sensing performance under a random secondary network, the optimal number of cooperating SUs is investigated to minimize the total error rate of the final decision. Secondly, the achievable ergodic capacity and throughput of SUs are studied and the technique of determining an appropriate number of cooperating SUs is proposed to optimize the secondary transmission performance based on a target total error rate requirement. In the last technical chapter, FD spectrum sensing (FDSS) and sensing-based spectrum sharing (FD-SBSS) are investigated. There exists a threshold pair, not a single threshold, due to the self-interference caused by the simultaneous sensing and transmission. Firstly, by utilizing the derived expressions of false alarm and detection rates, the optimal decision threshold pair is obtained to minimize total error rate for the FDSS scheme. Secondly, in order to further improve the secondary transmission performance, the FD-SBSS scheme is proposed and the collision and spectrum waste probabilities are studied. Furthermore, different antenna partitioning methods are proposed to maximize the achievable throughput of SUs under both FDSS and FD-SBSS schemes.
63

Channel adaptive transmission of big data: a complete temporal characterization and its application

Wang, Wen-Jing 12 December 2018 (has links)
We investigate the statistics of transmission time of wireless systems employing adaptive transmission. Unlike traditional transmission systems where the transmission time of a fixed amount of data is typically regarded as a constant, the transmission time with adaptive transmission systems becomes a random variable, as the transmission rate varies with the fading channel condition. To facilitate the design and optimization of wireless transmission schemes, we present an analytical framework to determine statistical characterizations for the transmission time with adaptive transmission. In particular, we derive the exact statistics of transmission time over block fading channels. The probability mass function (PMF) and cumulative distribution function (CDF) of transmission time are obtained for both slow and fast fading scenarios. We further extend our analysis to Markov channels, where the transmission time becomes a sequence of exponentially distributed random-length time slots. Analytical expression for the probability density function (PDF) of transmission time is derived for both fast and slow fading scenarios. Since the energy consumption can be characterized by the product of power consumption and transmission time, we also evaluate the energy consumption for wireless systems with adaptive transmission. Cognitive radio communication can opportunistically access underutilized spectrum for emerging wireless applications. With interweave cognitive implementation, a secondary user (SU) transmits only if a primary user does not occupy the channel and waits for transmission otherwise. Therefore, secondary packet transmission involves both transmission and waiting periods. The resulting extended delivery time (EDT) is critical to the throughput analysis of secondary system. With the statistical results of transmission time, we derive the PDF of EDT considering random-length SU transmission and waiting periods for continuous spectrum sensing and semi-periodic spectrum sensing. Taking spectrum sensing errors into account, we propose a discrete Markov chain modeling slotted secondary transmission coupled with periodic spectrum sensing. Markov modeling is applied to energy efficiency optimization and queuing performance evaluation. / Graduate
64

Secure MAC protocols for cognitive radio networks

Alhakami, Wajdi January 2016 (has links)
With the rapid increase in wireless devices, an effective improvement in the demand of efficient spectrum utilisation for gaining better connectivity is needed. Cognitive Radio (CR) is an emerging technology that exploits the inefficient utilisation of the unused spectrum dynamically. Since spectrum sharing is responsible for coordinating channels’ access for Cognitive Users (CUs), the Common Control Channel (CCC) is one of the existing methods used to exchange the control information between CUs. However, the unique characteristics and parameters of Cognitive Radio Networks (CRNs) present several possible threats targeting spectrum sensing, spectrum management, spectrum sharing, and spectrum mobility leading to the deterioration of the network performance. Thus, protection and detection security mechanisms are essential to maintaining the CRNs. This thesis presents a novel decentralised CR MAC protocol that successfully utilises the unused portion of the licensed band. The protocol achieves improved performance; communication time and throughput when compared to two benchmark protocols. Less communication time and higher throughput are accomplished by the protocol due to performing fast switching to the selected available data channel for initiating data transmission. The proposed protocol is then extended to two different versions based on two authentication approaches applied to it; one using Digital Signature and another is based on Shared-Key. The two proposed secure protocols address the security requirements in CRNs leading to subsequent secure communication among CUs. The protocols function effectively in providing defence against several attacks related to the MAC layer such as; Spectrum Sensing Data Manipulation/Falsification, Data Tempering and Modification, Jamming attacks, Eavesdropping, Forgery and Fake control information attacks, MAC address spoofing, and unauthorised access attacks. The associated security algorithms ensure the successful secure communication between CUs in a cooperative approach. Moreover, the security protocols are investigated and analysed in terms of security flows by launching unauthorised access and modification attacks on the transmitted information. The testing results demonstrated that two protocols perform successful detection of threats and ensure secure communication in CRNs.
65

Estimation of Subspace Occupancy

January 2014 (has links)
abstract: The ability to identify unoccupied resources in the radio spectrum is a key capability for opportunistic users in a cognitive radio environment. This paper draws upon and extends geometrically based ideas in statistical signal processing to develop estimators for the rank and the occupied subspace in a multi-user environment from multiple temporal samples of the signal received at a single antenna. These estimators enable identification of resources, such as the orthogonal complement of the occupied subspace, that may be exploitable by an opportunistic user. This concept is supported by simulations showing the estimation of the number of users in a simple CDMA system using a maximum a posteriori (MAP) estimate for the rank. It was found that with suitable parameters, such as high SNR, sufficient number of time epochs and codes of appropriate length, the number of users could be correctly estimated using the MAP estimator even when the noise variance is unknown. Additionally, the process of identifying the maximum likelihood estimate of the orthogonal projector onto the unoccupied subspace is discussed. / Dissertation/Thesis / Masters Thesis Electrical Engineering 2014
66

Cooperative spectrum sensing for cognitive radio

Prawatmuang, Warit January 2013 (has links)
Cognitive Radio (CR) aims to access the wireless spectrum in an opportunistic manner while the licensed user is not using it. To accurately determine the licensed user's existence, spectrum sensing procedure is vital to CR system. Energy detection-based spectrum sensing techniques is favourable due to its simplicity and low complexity. In addition, to improve the detection performance, cooperative spectrum sensing technique exploits multi-user diversity and mitigates detection uncertainty. In this thesis, we investigate several energy detection based cooperative spectrum sensing techniques.First, the closed-form analysis for the Equal Gain Combining based Soft Decision Combining (EGC-SDC) scheme, in which all CR users forward its observation to the fusion center, is derived. In order to reduce the communication overhead between CR users and the fusion center, we proposed quantized cooperative spectrum sensing technique, in which CR users quantize its local observation before forwarding to the fusion center. Next, the Double Threshold scheme, where some users only forward its local decision while other users forward its observation, is considered and analyzed. To further reduce the communication overhead, we also proposed that quantization is applied to the users who forward its observation. Later on, three sequential cooperative spectrum sensing schemes in time-varying channel are considered. By aggregating past local observations from previous sensing slots, CR users can improve the detection performance. The Weighted Sequential Energy Detector (SED) scheme simply takes fixed number of past local observations, while the other two schemes, Two-Stage SED and Differential SED, adaptively determine the number of observations, based on its decision towards primary user's existence.Simulation results show that the analysis on EGC-SDC scheme is accurate and the quantized cooperative spectrum sensing technique can improve the performance and approach the detection performance of EGC-SDC scheme with much less bandwidth requirement. Also, the Double Threshold scheme can help improve the detection performance over the conventional technique. Furthermore, the analysis on Double Threshold provides a closed-form for the probability of false alarm and detection. Additionally, the sequential spectrum sensing schemes are shown to improve the detection performance and enable CR system to work in scenarios that the conventional technique can not accommodate.
67

Threshold Based Opportunistic Scheduling of Secondary Users in Underlay Cognitive Radio Networks

Song, Yao 12 1900 (has links)
In underlay cognitive radio networks, secondary users can share the spectrum with primary users as long as the interference caused by the secondary users to primary users is below a certain predetermined threshold. It is reasonable to assume that there is always a large pool of secondary users trying to access the channel, which can be occupied by only one secondary user at a given time. As a result, a multi-user scheduling problem arises among the secondary users. In this thesis, by manipulating basic schemes based on selective multi-user diversity, normalized thresholding, transmission power control, and opportunistic round robin, we propose and analyze eight scheduling schemes of secondary users in an underlay cognitive radio set-up. The system performance of these schemes is quantified by using various performance metrics such as the average system capacity, normalized average feedback load, scheduling outage probability, and system fairness of access. In our proposed schemes, the best user out of all the secondary users in the system is picked to transmit at each given time slot in order to maximize the average system capacity. Two thresholds are used in the two rounds of the selection process to determine the best user. The first threshold is raised by the power constraint from the primary user. The second threshold, which can be adjusted by us, is introduced to reduce the feedback load. The overall system performance is therefore dependent on the choice of these two thresholds and the number of users in the system given the channel conditions for all the users. In this thesis, by deriving analytical formulas and presenting numerical examples, we try to provide insights of the relationship between the performance metrics and the involved parameters including two selection thresholds and the number of active users in the system, in an effort to maximize the average system capacity as well as satisfy the requirements of scheduling outage probability and feedback load.
68

Realization of LSTM Based Cognitive Radio Network

Valluru, Aravind-Deshikh 08 1900 (has links)
This thesis presents the realization of an intelligent cognitive radio network that uses long short term memory (LSTM) neural network for sensing and predicting the spectrum activity at each instant of time. The simulation is done using Python and GNU Radio. The implementation is done using GNU Radio and Universal Software Radio Peripherals (USRP). Simulation results show that the confidence factor of opportunistic users not causing interference to licensed users of the spectrum is 98.75%. The implementation results demonstrate high reliability of the LSTM based cognitive radio network.
69

Towards Energy Efficient Cognitive Radio Systems

Alabbasi, AbdulRahman 14 July 2016 (has links)
Cognitive radio (CR) is a cutting-edge wireless communication technology that adopts several existing communication concepts in order to efficiently utilize the spectrum and meet the users demands of high throughput and real-time systems. Conventionally, high throughput demands are met through adopting broadband and multi-antenna technologies such as, orthogonal frequency division multiplexing (OFDM) and Multi-Input Multi-Output (MIMO). Whereas, real-time application demands are met by analyzing metrics which characterize the delay limited channels, such as, outage probability over block-fading channels. Being an environmental friendly technology, energy efficiency metrics should be considered in the design of a CR application. This thesis tackles the energy efficiency of CR system from different aspects, utilizing different measuring metrics and constrains. Under the single-input single-output (SISO) OFDM we minimized the energy per goodbit (EPG) metric subject to several power and Quality of Service (QoS) constraints. In this approach, the minimum EPG metric is optimized via proposing two optimal and sub-optimal resource allocation schemes. We consider several parameters as optimization variables, such as, power policy, sensing threshold, and channel quality threshold. We also captured the impact of involving the media access control (MAC) layers parameters, such as, frame length, in the minimization of a modified EPG metric. Also, a MAC protocol, i.e., hybrid automatic repeat request (HARQ), and the associated power consumption of the retransmission mechanism is considered in the formulation of the problem. In this context, the optimal power and frame length are derived to minimize the modified EPG while considering several spectrum-sharing scenarios, which depend on sensing information. In MIMO based CR system, we maximized capacity to power ratio (CPR) (as an energy efficiency (EE) metric) subject to several power and QoS constraints. In this context, the impact of sensing information with imperfect channel state information (CSI) of the secondary channel has been considered. To realize a CR system with real-time applications we minimized the outage probability over M block-fading channel with several long-term and short-term energy constrains. We derive the minimum outage region and the associated optimal power. Tractable expressions to lower and upper bound the outage probability are derived. We then analyze the impact of utilizing the sensing process of primary user activity.
70

Queueing based resource allocation in cognitive radio networks

Tsimba, Hilary Mutsawashe January 2017 (has links)
With the increase in wireless technology devices and mobile users, wireless radio spectrum is coming under strain. Networks are becoming more and more congested and free usable spectrum is running out. This creates a resource allocation problem. The resource, wireless spectrum, needs to be allocated to users in a manner such that it is utilised efficiently and fairly. The objective of this research is to find a solution to the resource allocation problem in radio networks, i.e to increase the efficiency of spectrum utilisation by making maximum use of the spectrum that is currently available through taking advantage of co-existence and exploiting interference limits. The solution proposed entails adding more secondary users (SU) on a cognitive radio network (CRN) and having them transmit simultaneously with the primary user. A typical network layout was defined for the scenario. The interference temperature limit (ITL) was exploited to allow multiple SUs to share capacity. Weighting was applied to the SUs and was based on allowable transmission power under the ITL. Thus a more highly weighted SU will be allowed to transmit at more power. The weighting can be determined by some network-defined rule. Specific models that define the behaviour of the network were then developed using queuing theory, specifically weighted processor sharing techniques. Optimisation was finally applied to the models to maximize system performance. Convex optimization was deployed to minimize the length of the queue through the power allocation ratio. The system was simulated and results for the system performance obtained. Firstly, the performance of the proposed models under the processor-sharing techniques was determined and discussed, with explanations given. Then optimisation was applied to the processor-sharing results and the performance was measured. In addition, the system performance was compared to other existing solutions that were deemed closest to the proposed models. / Dissertation (MEng)--University of Pretoria, 2017. / Electrical, Electronic and Computer Engineering / MEng / Unrestricted

Page generated in 0.0365 seconds