The interference alignment (IA) algorithm based on FDPM subspace tracking (FDPM-ST IA) is proposed for MIMO cognitive network (CRN) with multiple primary users in this paper. The feasibility conditions of FDPM-S...The interference alignment (IA) algorithm based on FDPM subspace tracking (FDPM-ST IA) is proposed for MIMO cognitive network (CRN) with multiple primary users in this paper. The feasibility conditions of FDPM-ST IA is also got. Futherly, IA scheme of secondary network and IA scheme of primary network are given respectively without assuming a priori knowledge of interference covariance matrices. Moreover, the paper analyses the computational complexity of FDPM-ST IA. Simulation results and theoretical calculations show that the proposed algorithm can achieve higher sum rate with lower computational complexity.展开更多
A cooperative model of multiple primary and secondary users coexisting cognitive network is presented. In this model, the control center is aware of all the users' locations in order to allocate the nearest secondary...A cooperative model of multiple primary and secondary users coexisting cognitive network is presented. In this model, the control center is aware of all the users' locations in order to allocate the nearest secondary user to the primary user. The control center is aware of the information of the unused spectral resources in terms of the feedback of the sensing results from the secondary users. It allocates idle frequency bands among the secondary users. The primary user accesses the base station (BS) in orthogonal subchannels, and it cooperatively transmits packets with the secondary user and exploits the free band assigned by the control center to amplify-and-forward what it receives immediately. Under this scenario, the outage probability of the cooperative transmission pair of the primary and secondary transmitters is derived. The numerical simulation of the outage probabilities as a function of primary transmission probability ps, power allocation ratio ξ between the primary and secondary users, and the numbers of the primary and secondary users are given respectively. The results show that the optimal system performance is achieved under the conditions of ξ=0.5 and the numbers of the primary and the secondary users being equal.展开更多
Resource reservation is an effective measure to ensure end-to-end quality of service (QoS), however, the burstyness of the traffic makes the reservation idle some time, and forms a waste of re- sources. Based on the...Resource reservation is an effective measure to ensure end-to-end quality of service (QoS), however, the burstyness of the traffic makes the reservation idle some time, and forms a waste of re- sources. Based on the analysis of active queue management (AQM) of DiffServ network, we propose a resource management scheme, which allows borrowing resources from unused reservation, accord- ing to the characteristics and advantages of cognitive networks. First, some nodes reserve certain proportion capacity for some special services (for instance, some services pay additional money) to guarantee the priority of these applications. Then resources are assigned according to the different parameters of services. If the available resource can not meet the requirements of new services, real- time ones are admitted with higher priority and allow borrowing the unused reservation from other nodes appropriately. Simulations show that, the proposed scheme has good performance at network resource utilization, the admission rate of new aDolications and OoS of users.展开更多
In this paper,we propose a mathematical model of aggregate co-channel interference over Rayleigh fading in cognitive networks.Unlike the statistical models in the literature that aim at finding the bound or approximat...In this paper,we propose a mathematical model of aggregate co-channel interference over Rayleigh fading in cognitive networks.Unlike the statistical models in the literature that aim at finding the bound or approximation of the interference,the proposed model gives an accurate expression of probability density function(PDF),cumulative distribution function(CDF) and mean and variance of the interference,which takes into account a number of factors,such as spectrum sensing scheme,and spatial distribution of the secondary users(SUs).In particular,we focus on a more general spatial structure where there are two roles of primary users(PUs)and the interfering SUs distributed in the two-dimensional space.The framework developed in this paper is easy to be applied in power control,error evaluation and other applications.展开更多
In this paper, we propose and evaluate outage performance of a mixed amplify-and-forward(AF) and decode-and-forward(DF) relaying protocol in underlay cognitive radio. Different from the conventional AF and DF protocol...In this paper, we propose and evaluate outage performance of a mixed amplify-and-forward(AF) and decode-and-forward(DF) relaying protocol in underlay cognitive radio. Different from the conventional AF and DF protocols, in the proposed protocol, a secondary source attempts to transmit its signal to a secondary destination with help of two secondary relays. One secondary relay always operates in AF mode, while the remaining one always operates in DF mode. Moreover, we also propose a relay selection method, which relies on the decoding status at the DF relay. For performance evaluation and comparison, we derive the exact and approximate closedform expressions of the outage probability for the proposed protocol over Rayleigh fading channel. Finally, we run Monte Carlo simulations to verify the derivations. Results presented that the proposed protocol obtains a diversity order of three and the outage performance of our scheme is between that of the conventional underlay DF protocol and that of the conventional underlay AF protocol.展开更多
Channel assignment is a challenge for distributed cognitive networks due to spectrum mobility and lack of centralized entity.We present a dynamic and efficient algorithm via conflict shifting,referred as Shifting-base...Channel assignment is a challenge for distributed cognitive networks due to spectrum mobility and lack of centralized entity.We present a dynamic and efficient algorithm via conflict shifting,referred as Shifting-based Channel Assignment(SCA).In this algorithm,the system was modeled with a conflict graph,and users cannot assign the channels that primary users(legacy users) and neighbors already occupied.In order to eliminate the conflicts between neighbors efficiently,secondary users(unlicensed users) try to transfer them through a straight path to the boundary,where conflicts are easier to solve as there are less neighbors for boundary users.Actions in one shift are executed in slots,and users act in a synchronous and separated manner.As a result,some of the conflicting channels are avoid from directly abandoned,and for this,utility of the entire network can be improved.Simulation results show that the proposed algorithm can provide similar utility performance while obviously reducing the communication cost than bargaining-base algorithms.In small scale networks with low user mobility(under 20%),it reduces 50% of the communication overhead than the later.展开更多
This paper analyzes a self-adaptive Quality of Service (QoS) control architecture for cognitive networks (CNs) that is based on intelligent service awareness. In this architecture, packets can be identified and cl...This paper analyzes a self-adaptive Quality of Service (QoS) control architecture for cognitive networks (CNs) that is based on intelligent service awareness. In this architecture, packets can be identified and classified using an intelligent service-aware classification model. Drawing on Control Theory, network traffic can be controlled with a self-adaptive QoS control mechanism that has side-road collaboration. In this architecture, perception, analysis, correlation, feedback, decision making, allocation, and implementation QoS mechanisms are created automatically. These mechanisms can adjust resource allocation, adapt to a changeable network environment, optimize end-to-end performance of the network, and ensure QoS.展开更多
BACKGROUND Group cognitive behavioral therapy(GCBT)is increasingly being used to treat obsessive-compulsive disorder(OCD)because of its high efficiency,economy,and interaction among group members.However,the changes i...BACKGROUND Group cognitive behavioral therapy(GCBT)is increasingly being used to treat obsessive-compulsive disorder(OCD)because of its high efficiency,economy,and interaction among group members.However,the changes in network functional connectivity(FC)in patients with OCD with GCBT remain unclear.AIM To investigate inter-and intra-network resting-state FC(rs-FC)abnormalities before and after GCBT in unmedicated patients with OCD and validate the efficacy of GCBT.METHODS Overall,33 individuals with OCD and 26 healthy controls underwent resting-state functional magnetic resonance imaging.The patients were rescanned 12 weeks after GCBT.Four cognition-related networks-default mode network(DMN),dorsal attention network(DAN),salience network(SAN),and frontoparietal network(FPN)-were selected to examine FC abnormalities within and between OCD networks before and after GCBT.Neuropsychological assessments including memory,executive function,speech,attention,and visuospatial ability were reassessed following GCBT.Pearson’s correlations were used to analyze the relationship between aberrant FC in cognition-related networks and altered neuropsychological assessments in patients.RESULTS Rs-FC within the DMN and DAN decreased significantly.Additionally,rs-FC between the DMN-DAN,DMNFPN,DMN-SAN,and DAN-SAN also decreased.Significant improvements were observed in cognitive functions,such as memory,executive function,attention,and visuospatial ability.Furthermore,reduced rs-FC within the DMN correlated with visuospatial ability and executive function;DAN positively correlated with Shape Trails Test(STT)-A test elapsed time;DMN-DAN negatively correlated with Rey-Osterrieth Complex Figure(Rey-O)mimicry time and the three elapsed times of the tower of Hanoi;DMN-SAN negatively correlated with Rey-O imitation time and positively correlated with STT-A test elapsed time;and DMN-FPN negatively correlated with Auditory Word Learning Test N1 and N4 scores.CONCLUSION Decreased rs-FC within the DMN and DAN,which correlated with executive function post-treatment,has potential as a neuroimaging marker to predict treatment response to GCBT in patients with OCD.展开更多
This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the second...This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the secondary user based on the square law.The proposed method is implemented with the signal transmission of multiple outputs-orthogonal frequency division multiplexing.Additionally,the proposed method is considered the dynamic detection threshold adjustments and energy identification spectrum sensing technique in cognitive radio systems.In the dynamic threshold,the signal ratio-based threshold is fixed.The threshold is computed by considering the Modified Black Widow Optimization Algorithm(MBWO).So,the proposed methodology is a combination of dynamic threshold detection and MBWO.The general threshold-based detection technique has different limitations such as the inability optimal signal threshold for determining the presence of the primary user signal.These limitations undermine the sensing accuracy of the energy identification technique.Hence,the ETBED technique is developed to enhance the energy efficiency of cognitive radio networks.The projected approach is executed and analyzed with performance and comparison analysis.The proposed method is contrasted with the conventional techniques of theWhale Optimization Algorithm(WOA)and GreyWolf Optimization(GWO).It indicated superior results,achieving a high average throughput of 2.2 Mbps and an energy efficiency of 3.8,outperforming conventional techniques.展开更多
Goethite iron precipitation process is a key step in direct leaching process of zinc,whose aim is to remove ferrous ions from zinc sulphate solution.The process consists of several cascade reactors,and each of them co...Goethite iron precipitation process is a key step in direct leaching process of zinc,whose aim is to remove ferrous ions from zinc sulphate solution.The process consists of several cascade reactors,and each of them contains complex chemical reactions featured by strong nonlinearity and large time delay.Therefore,it is hard to build up an accurate mathematical model to describe the dynamic changes in the process.In this paper,by studying the mechanism of these reactions and combining historical data and expert experience,the modeling method called asynchronous fuzzy cognitive networks(AFCN)is proposed to solve the various time delay problem.Moreover,the corresponding AFCN model for goethite iron precipitation process is established.To control the process according to fuzzy rules,the nonlinear Hebbian learning algorithm(NHL)terminal constraints is firstly adopted for weights learning.Then the model parameters of equilibrium intervals corresponding to different operating conditions can be calculated.Finally,the matrix meeting the expected value and the weight value of steady states is stored into fuzzy rules as prior knowledge.The simulation shows that the AFCN model for goethite iron precipitation process could precisely describe the dynamic changes in the system,and verifies the superiority of control method based on fuzzy rules.展开更多
To study the throughput scheduling problem under interference temperature in cognitive radio networks, an immune algorithm-based suboptimal method was proposed based on its NP-hard feature. The problem is modeled as a...To study the throughput scheduling problem under interference temperature in cognitive radio networks, an immune algorithm-based suboptimal method was proposed based on its NP-hard feature. The problem is modeled as a constrained optimization problem to maximize the total throughput of the secondary users( SUs). The mapping between the throughput scheduling problems and the immune algorithm is given. Suitable immune operators are designed such as binary antibody encoding, antibody initialization based on pre-knowledge, a proportional clone to its affinity and an adaptive mutation operator associated with the evolutionary generation. The simulation results showthat the proposed algorithm can obtain about 95% of the optimal throughput and operate with much lower liner computational complexity.展开更多
In this paper, we investigate a joint beamforming and time switching(TS) design for an energy-constrained cognitive two-way relay(TWR) network. In the network, the energy-constrained secondary user(SU) relay employs T...In this paper, we investigate a joint beamforming and time switching(TS) design for an energy-constrained cognitive two-way relay(TWR) network. In the network, the energy-constrained secondary user(SU) relay employs TS protocol to harvest energy from the signals sent by the circuit-powered primary user(PU) transmitter, and then exploits the harvested energy to perform information forwarding. Our aim is to maximize the sum rate of SUs under the constraints of the data rate of PU, the energy harvesting and the transmit power of the SU relay. To determine the beamforming matrix and TS ratio, we decouple the original non-convex problem into two subproblems which can be solved by semidefinite relaxation and successive convex optimization methods. Furthermore, we derive closed form expressions of the optimal solutions for each subproblem, which facilitates the design of a suboptimal iterative algorithm to handle the original sum rate maximization problem. Simulation results are presented to illustrate the effectiveness and superior performance of the proposed joint design against other conventional schemes in the literature.展开更多
With the development of wireless technologies,multifarious standards are currently used in the underground coal mine communication systems.In this paper,the coexistence of 802.15.4 based wireless senser networks (WSN...With the development of wireless technologies,multifarious standards are currently used in the underground coal mine communication systems.In this paper,the coexistence of 802.15.4 based wireless senser networks (WSNs) with other wireless networks using cognitive radio technique are discussed.Multiple sensor nodes are involved in the spectrum sensing to avoid the interference from other wireless users.The more the sensor nodes cooperate in the sensing,the better the detection performance can be obtained; however,more energy is consumed.How to get the tradeoff between energy efficiency and detection performance is a key problem.According to the requirements for detection,we first give the least required detection time of a single sensor node.Then,the voting fusion rule is adopted for the final decision making.Finally,the relationship between final detection performance and energy consumption is analyzed.展开更多
According to the fact that the secondary users' delay requirements for data transmission are not unitary in cognitive radio networks, the secondary users are divided into two classes, denoted by SU1 and SU2, respecti...According to the fact that the secondary users' delay requirements for data transmission are not unitary in cognitive radio networks, the secondary users are divided into two classes, denoted by SU1 and SU2, respectively. It is assumed that SU1 has a higher priority to occupy the primary users' unutilized channels than SU2. A preemptive resume priority M/G/1 queuing network is used to model the multiple spectrum handoffs processing. By using a state transition probability matrix and a cost matrix, the average cumulative delays of SU1 and SU2 are calculated, respectively. Numerical results show that the more the primary user's traffic load, the more rapidly the SU2's cumulative handoff delay grows. Compared with the networks where secondary users are unitary, the lower the SUI's arrival rate, the more obviously both SUI's and SU2's handoff delays decrease. The admission access regions limited by the maximum tolerable delay can also facilitate the design of admission control rules for graded secondary users.展开更多
To cover remote areas where terrestrial cellular networks may not be available,non-terrestrial infrastructures such as satellites and unmanned aerial vehicles(UAVs)can be utilized in the upcoming sixth-generation(6G)e...To cover remote areas where terrestrial cellular networks may not be available,non-terrestrial infrastructures such as satellites and unmanned aerial vehicles(UAVs)can be utilized in the upcoming sixth-generation(6G)era.Considering the spectrum scarcity problem,satellites and UAVs need to share the spectrum to save costs,leading to a cognitive satellite-UAV network.Due to the openness of both satellite links and UAV links,communication security has become a major concern in cognitive satelliteUAV networks.In this paper,we safeguard a cognitive satellite-UAV network from a physical layer security(PLS)perspective.Using only the slowlyvarying large-scale channel state information(CSI),we jointly allocate the transmission power and subchannels to maximize the secrecy sum rate of UAV users.The optimization problem is a mixed integer nonlinear programming(MINLP)problem with coupling constraints.We propose a heuristic algorithm which relaxes the coupling constraints by the penalty method and obtains a sub-optimal low-complexity solution by utilizing random matrix theory,the max-min optimization tool,and the bipartite graph matching algorithm.The simulation results corroborate the superiority of our proposed scheme.展开更多
To improve spectrum utilization and minimize interference to Primary User (PU), an adaptive spectrum decision method is proposed for Secondary User (SU), while taking traffic load balancing and spectrum heterogeneity ...To improve spectrum utilization and minimize interference to Primary User (PU), an adaptive spectrum decision method is proposed for Secondary User (SU), while taking traffic load balancing and spectrum heterogeneity into consideration. Long-term statistics and current sensing results are integrated into the proposed decision method of spectrum access. Two decision methods, namely probability based and sensing based, are presented, compared and followed by performance analysis in terms of delay. For probability based spectrum decision, Short-Time-Job-First (STJF) priority queuing discipline is employed to minimize average residual time and theoretical conclusion is derived in a novel way. For sensing based decision we treat the interrupted service of SU as newly incoming and re-decision process is initialized to find available spectrum in a First-Available-First-Access (FAFA) fashion. Effect of sensing error in PHY layer is also analyzed in terms of extended average residual time. Simulation results show that, for relatively low arriving rate of SU traffic, the proposed spectrum decision method yields at least a delay reduction of 39.5% compared with non-adaptive method. The proposed spectrum decision can significantly improve delay performance even facing sensing errors, which cause performance degeneration to both PU and SU.展开更多
Cooperative spectrum sensing in cog- nitive radio is investigated to improve the det- ection performance of Primary User (PU). Meanwhile, cluster-based hierarchical coop- eration is introduced for reducing the overh...Cooperative spectrum sensing in cog- nitive radio is investigated to improve the det- ection performance of Primary User (PU). Meanwhile, cluster-based hierarchical coop- eration is introduced for reducing the overhead as well as maintaining a certain level of sens- ing performance. However, in existing hierar- chically cooperative spectrum sensing algo- rithms, the robustness problem of the system is seldom considered. In this paper, we pro- pose a reputation-based hierarchically coop- erative spectrum sensing scheme in Cognitive Radio Networks (CRNs). Before spectrum sensing, clusters are grouped based on the location correlation coefficients of Secondary Users (SUs). In the proposed scheme, there are two levels of cooperation, the first one is performed within a cluster and the second one is carried out among clusters. With the reputa- tion mechanism and modified MAJORITY rule in the second level cooperation, the pro- posed scheme can not only relieve the influ- ence of the shadowing, but also eliminate the impact of the PU emulation attack on a rela- tively large scale. Simulation results show that, in the scenarios with deep-shadowing or mul- tiple attacked SUs, our proposed scheme ach- ieves a better tradeoff between the system robustness and the energy saving compared with those conventionally cooperative sensing schemes.展开更多
In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single...In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single PU in their frameworks. In this paper, we will consider a more complicated scenario with multiple PUs and try to investigate the cooperative jamming between multiple PUs and a single SU. When there are multiple PUs in CRN, in order to obtain more spectrum for data transmission, SU will cooperate with multiple PUs at the same time. Considering that both PU and SU are rational and selfish individuals, the interaction between PUs and SU is formulated as a multi-leaders and single-follower Stackelberg game, wherein PU is the leader and SU is the follower. And the Stackelberg Equilibrium(SE) is considered as the final decisions accepted by all PUs and SU. Furthermore, we also prove that when a specific condition is satisfied, the existence of SE can be guaranteed. And a Gauss-Jacobi iterative algorithm is proposed to compute a SE. Finally, simulation results are given to verify the performance and demonstrate that both of the PUs' secrecy rate and the SU's transmission rate can be improved through cooperation.展开更多
In this paper, the outage perfor- mance of a cognitive relaying network over Nakagami-m fading channels, employing simultaneous wireless information and power transfer (SWIPT) technology is analyzed and evaluated. T...In this paper, the outage perfor- mance of a cognitive relaying network over Nakagami-m fading channels, employing simultaneous wireless information and power transfer (SWIPT) technology is analyzed and evaluated. The operation of this network is considered in conjunction with the convention- al decode-and-forward (DF) and incremental DF (IDF) protocols. For the conventional DF protocol, it is assumed that there is no direct link between the secondary transmitter (S) and the secondary destination (D), while (for both protocols) after harvesting energy, the relay node (R) always helps to forward the resulting signal to D. However, for the IDF protocol, R assists in relaying S's information to D only when the direct communication between S and D has failed. Furthermore, for both DF and IDF protocols, we assume there is no power supply for R, and R harvests energy from the transmitted signal of S. We derive exact ana- lytical expressions for the outage probability at D in DF and IDF protocols, respectively, in terms of the bivariate Meijer's G-function. Performance evaluation results obtained by means of Monte-Carlo simulations are also provided and have validated the correctness of the oroDosed analysis.展开更多
In the trust management scheme of the distributed cognitive radio networks, the absence of the central control devices cause many problems such as a lack of standardized control for trust computation, and the absence ...In the trust management scheme of the distributed cognitive radio networks, the absence of the central control devices cause many problems such as a lack of standardized control for trust computation, and the absence of the decision makers in trust evaluation and collaborative decision making. A trust management mechanism based on the jury system for distributed cognitive radio networks is proposed in this paper. The "jury user" is designed to collaboratively examine the reputation of the cognitive user in the networks and to perform data fusion and spectrum allocation for distributed cognitive radio networks. Simulation analysis results show that the proposed scheme can ensure accuracy and fairness in trust evaluation and improve effectiveness and flexibility of spectrum allocation.展开更多
基金the National Nature Science Foundation of China under Grant No.61271259 and 61301123,the Chongqing Nature Science Foundation under Grant No.CTSC2011jjA40006,and the Research Project of Chongqing Education Commission under Grant No.KJ120501 and KJ120502
文摘The interference alignment (IA) algorithm based on FDPM subspace tracking (FDPM-ST IA) is proposed for MIMO cognitive network (CRN) with multiple primary users in this paper. The feasibility conditions of FDPM-ST IA is also got. Futherly, IA scheme of secondary network and IA scheme of primary network are given respectively without assuming a priori knowledge of interference covariance matrices. Moreover, the paper analyses the computational complexity of FDPM-ST IA. Simulation results and theoretical calculations show that the proposed algorithm can achieve higher sum rate with lower computational complexity.
基金The National Natural Science Foundation of China (No.60972026)the Natural Science Foundation of Jiangsu Province (No.BK2008289)Specialized Research Fund for the Doctoral Program ofHigher Education (No.20090092110009)
文摘A cooperative model of multiple primary and secondary users coexisting cognitive network is presented. In this model, the control center is aware of all the users' locations in order to allocate the nearest secondary user to the primary user. The control center is aware of the information of the unused spectral resources in terms of the feedback of the sensing results from the secondary users. It allocates idle frequency bands among the secondary users. The primary user accesses the base station (BS) in orthogonal subchannels, and it cooperatively transmits packets with the secondary user and exploits the free band assigned by the control center to amplify-and-forward what it receives immediately. Under this scenario, the outage probability of the cooperative transmission pair of the primary and secondary transmitters is derived. The numerical simulation of the outage probabilities as a function of primary transmission probability ps, power allocation ratio ξ between the primary and secondary users, and the numbers of the primary and secondary users are given respectively. The results show that the optimal system performance is achieved under the conditions of ξ=0.5 and the numbers of the primary and the secondary users being equal.
基金Supported by the High Technology Research and Development Program of China(No.2009AA01Z211)the Fundamental Research Funds for Central Universities of China(No.2009YJS034)+1 种基金Beijing Nature Science Foundation of China(No.4112044)the Research Fund for the Doctoral Program of Higer Education of China(No.20120009110009)
文摘Resource reservation is an effective measure to ensure end-to-end quality of service (QoS), however, the burstyness of the traffic makes the reservation idle some time, and forms a waste of re- sources. Based on the analysis of active queue management (AQM) of DiffServ network, we propose a resource management scheme, which allows borrowing resources from unused reservation, accord- ing to the characteristics and advantages of cognitive networks. First, some nodes reserve certain proportion capacity for some special services (for instance, some services pay additional money) to guarantee the priority of these applications. Then resources are assigned according to the different parameters of services. If the available resource can not meet the requirements of new services, real- time ones are admitted with higher priority and allow borrowing the unused reservation from other nodes appropriately. Simulations show that, the proposed scheme has good performance at network resource utilization, the admission rate of new aDolications and OoS of users.
基金the National Natural Science Foundation of China(Nos.61071152 and 61271316)the National Basic Research Program(973)of China(Nos.2010CB731406 and 2013CB329605)the National"Twelfth Five-Year"Plan for Science&Technology Support(No.2012BAH38B04)
文摘In this paper,we propose a mathematical model of aggregate co-channel interference over Rayleigh fading in cognitive networks.Unlike the statistical models in the literature that aim at finding the bound or approximation of the interference,the proposed model gives an accurate expression of probability density function(PDF),cumulative distribution function(CDF) and mean and variance of the interference,which takes into account a number of factors,such as spectrum sensing scheme,and spatial distribution of the secondary users(SUs).In particular,we focus on a more general spatial structure where there are two roles of primary users(PUs)and the interfering SUs distributed in the two-dimensional space.The framework developed in this paper is easy to be applied in power control,error evaluation and other applications.
基金supported by the 2016 research fund of University of Ulsan
文摘In this paper, we propose and evaluate outage performance of a mixed amplify-and-forward(AF) and decode-and-forward(DF) relaying protocol in underlay cognitive radio. Different from the conventional AF and DF protocols, in the proposed protocol, a secondary source attempts to transmit its signal to a secondary destination with help of two secondary relays. One secondary relay always operates in AF mode, while the remaining one always operates in DF mode. Moreover, we also propose a relay selection method, which relies on the decoding status at the DF relay. For performance evaluation and comparison, we derive the exact and approximate closedform expressions of the outage probability for the proposed protocol over Rayleigh fading channel. Finally, we run Monte Carlo simulations to verify the derivations. Results presented that the proposed protocol obtains a diversity order of three and the outage performance of our scheme is between that of the conventional underlay DF protocol and that of the conventional underlay AF protocol.
基金Supported by the National Natural Science Foundation of China (No. 60832007)the National Hi-Tech Research and Development Plan of China (No. 2009AA011801)
文摘Channel assignment is a challenge for distributed cognitive networks due to spectrum mobility and lack of centralized entity.We present a dynamic and efficient algorithm via conflict shifting,referred as Shifting-based Channel Assignment(SCA).In this algorithm,the system was modeled with a conflict graph,and users cannot assign the channels that primary users(legacy users) and neighbors already occupied.In order to eliminate the conflicts between neighbors efficiently,secondary users(unlicensed users) try to transfer them through a straight path to the boundary,where conflicts are easier to solve as there are less neighbors for boundary users.Actions in one shift are executed in slots,and users act in a synchronous and separated manner.As a result,some of the conflicting channels are avoid from directly abandoned,and for this,utility of the entire network can be improved.Simulation results show that the proposed algorithm can provide similar utility performance while obviously reducing the communication cost than bargaining-base algorithms.In small scale networks with low user mobility(under 20%),it reduces 50% of the communication overhead than the later.
基金funded by the National High Technology Research and Development Planning ("863"Project) under Grant No. 2006AA01Z232, 2009AA01Z212, 2009AA01Z202the National Natural Science Foundation Project under Grant No. 61003237
文摘This paper analyzes a self-adaptive Quality of Service (QoS) control architecture for cognitive networks (CNs) that is based on intelligent service awareness. In this architecture, packets can be identified and classified using an intelligent service-aware classification model. Drawing on Control Theory, network traffic can be controlled with a self-adaptive QoS control mechanism that has side-road collaboration. In this architecture, perception, analysis, correlation, feedback, decision making, allocation, and implementation QoS mechanisms are created automatically. These mechanisms can adjust resource allocation, adapt to a changeable network environment, optimize end-to-end performance of the network, and ensure QoS.
基金Supported by the Pharmaceutical Science and Technology Project of Zhejiang Province,No.2023RC266the Natural Science Foundation of Ningbo,No.202003N4266.
文摘BACKGROUND Group cognitive behavioral therapy(GCBT)is increasingly being used to treat obsessive-compulsive disorder(OCD)because of its high efficiency,economy,and interaction among group members.However,the changes in network functional connectivity(FC)in patients with OCD with GCBT remain unclear.AIM To investigate inter-and intra-network resting-state FC(rs-FC)abnormalities before and after GCBT in unmedicated patients with OCD and validate the efficacy of GCBT.METHODS Overall,33 individuals with OCD and 26 healthy controls underwent resting-state functional magnetic resonance imaging.The patients were rescanned 12 weeks after GCBT.Four cognition-related networks-default mode network(DMN),dorsal attention network(DAN),salience network(SAN),and frontoparietal network(FPN)-were selected to examine FC abnormalities within and between OCD networks before and after GCBT.Neuropsychological assessments including memory,executive function,speech,attention,and visuospatial ability were reassessed following GCBT.Pearson’s correlations were used to analyze the relationship between aberrant FC in cognition-related networks and altered neuropsychological assessments in patients.RESULTS Rs-FC within the DMN and DAN decreased significantly.Additionally,rs-FC between the DMN-DAN,DMNFPN,DMN-SAN,and DAN-SAN also decreased.Significant improvements were observed in cognitive functions,such as memory,executive function,attention,and visuospatial ability.Furthermore,reduced rs-FC within the DMN correlated with visuospatial ability and executive function;DAN positively correlated with Shape Trails Test(STT)-A test elapsed time;DMN-DAN negatively correlated with Rey-Osterrieth Complex Figure(Rey-O)mimicry time and the three elapsed times of the tower of Hanoi;DMN-SAN negatively correlated with Rey-O imitation time and positively correlated with STT-A test elapsed time;and DMN-FPN negatively correlated with Auditory Word Learning Test N1 and N4 scores.CONCLUSION Decreased rs-FC within the DMN and DAN,which correlated with executive function post-treatment,has potential as a neuroimaging marker to predict treatment response to GCBT in patients with OCD.
文摘This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the secondary user based on the square law.The proposed method is implemented with the signal transmission of multiple outputs-orthogonal frequency division multiplexing.Additionally,the proposed method is considered the dynamic detection threshold adjustments and energy identification spectrum sensing technique in cognitive radio systems.In the dynamic threshold,the signal ratio-based threshold is fixed.The threshold is computed by considering the Modified Black Widow Optimization Algorithm(MBWO).So,the proposed methodology is a combination of dynamic threshold detection and MBWO.The general threshold-based detection technique has different limitations such as the inability optimal signal threshold for determining the presence of the primary user signal.These limitations undermine the sensing accuracy of the energy identification technique.Hence,the ETBED technique is developed to enhance the energy efficiency of cognitive radio networks.The projected approach is executed and analyzed with performance and comparison analysis.The proposed method is contrasted with the conventional techniques of theWhale Optimization Algorithm(WOA)and GreyWolf Optimization(GWO).It indicated superior results,achieving a high average throughput of 2.2 Mbps and an energy efficiency of 3.8,outperforming conventional techniques.
基金supported in part by the Program of the National Natural Science Foundation of China under Grant No.61673399in part by the Program of National Natural Science Foundation of Hunan Province under Grant No.2017JJ2329in part by Fundamental Research Funds for Central Universities of Central South University under Grant No.2018zzts550。
文摘Goethite iron precipitation process is a key step in direct leaching process of zinc,whose aim is to remove ferrous ions from zinc sulphate solution.The process consists of several cascade reactors,and each of them contains complex chemical reactions featured by strong nonlinearity and large time delay.Therefore,it is hard to build up an accurate mathematical model to describe the dynamic changes in the process.In this paper,by studying the mechanism of these reactions and combining historical data and expert experience,the modeling method called asynchronous fuzzy cognitive networks(AFCN)is proposed to solve the various time delay problem.Moreover,the corresponding AFCN model for goethite iron precipitation process is established.To control the process according to fuzzy rules,the nonlinear Hebbian learning algorithm(NHL)terminal constraints is firstly adopted for weights learning.Then the model parameters of equilibrium intervals corresponding to different operating conditions can be calculated.Finally,the matrix meeting the expected value and the weight value of steady states is stored into fuzzy rules as prior knowledge.The simulation shows that the AFCN model for goethite iron precipitation process could precisely describe the dynamic changes in the system,and verifies the superiority of control method based on fuzzy rules.
基金The National Natural Science Foundation of China(No.U150461361202099+2 种基金61201175U1204618)China Postdoctoral Science Foundation(No.2013M541586)
文摘To study the throughput scheduling problem under interference temperature in cognitive radio networks, an immune algorithm-based suboptimal method was proposed based on its NP-hard feature. The problem is modeled as a constrained optimization problem to maximize the total throughput of the secondary users( SUs). The mapping between the throughput scheduling problems and the immune algorithm is given. Suitable immune operators are designed such as binary antibody encoding, antibody initialization based on pre-knowledge, a proportional clone to its affinity and an adaptive mutation operator associated with the evolutionary generation. The simulation results showthat the proposed algorithm can obtain about 95% of the optimal throughput and operate with much lower liner computational complexity.
基金National Natural Science Foundation of China (61871241, 61771263)Postgraduate Research and Practice Innovation Program of Jiangsu Province (KYCX18-2422)+3 种基金Six Categories Talent Peak of Jiangsu Province (KTHY-039)Science and Technology Program of Nantong (JC2018127, JC2018129, GY22017013)Stereoscopic Coverage Communication Network Verification Platform for China Sea (PCL2018KP002)Open Research Fund of Nantong University-Nantong Joint Research Center for Intelligent Information Technology (KFKT2017A05, KFKT2017B02)
文摘In this paper, we investigate a joint beamforming and time switching(TS) design for an energy-constrained cognitive two-way relay(TWR) network. In the network, the energy-constrained secondary user(SU) relay employs TS protocol to harvest energy from the signals sent by the circuit-powered primary user(PU) transmitter, and then exploits the harvested energy to perform information forwarding. Our aim is to maximize the sum rate of SUs under the constraints of the data rate of PU, the energy harvesting and the transmit power of the SU relay. To determine the beamforming matrix and TS ratio, we decouple the original non-convex problem into two subproblems which can be solved by semidefinite relaxation and successive convex optimization methods. Furthermore, we derive closed form expressions of the optimal solutions for each subproblem, which facilitates the design of a suboptimal iterative algorithm to handle the original sum rate maximization problem. Simulation results are presented to illustrate the effectiveness and superior performance of the proposed joint design against other conventional schemes in the literature.
基金Special Funds for Postdoctoral Innovative Projects of Shandong Province(No.201103099)
文摘With the development of wireless technologies,multifarious standards are currently used in the underground coal mine communication systems.In this paper,the coexistence of 802.15.4 based wireless senser networks (WSNs) with other wireless networks using cognitive radio technique are discussed.Multiple sensor nodes are involved in the spectrum sensing to avoid the interference from other wireless users.The more the sensor nodes cooperate in the sensing,the better the detection performance can be obtained; however,more energy is consumed.How to get the tradeoff between energy efficiency and detection performance is a key problem.According to the requirements for detection,we first give the least required detection time of a single sensor node.Then,the voting fusion rule is adopted for the final decision making.Finally,the relationship between final detection performance and energy consumption is analyzed.
基金The National Natural Science Foundation of China(No.60972026,61271207)the National Science and Technology Major Project(No.2010ZX03006-002-01)+1 种基金the Specialized Research Fund for the Doctoral Program of Higher Education(No.20090092110009)the Specialized Development Foundation for the Achievement Transformation of Jiangsu Province(No.BA2010023)
文摘According to the fact that the secondary users' delay requirements for data transmission are not unitary in cognitive radio networks, the secondary users are divided into two classes, denoted by SU1 and SU2, respectively. It is assumed that SU1 has a higher priority to occupy the primary users' unutilized channels than SU2. A preemptive resume priority M/G/1 queuing network is used to model the multiple spectrum handoffs processing. By using a state transition probability matrix and a cost matrix, the average cumulative delays of SU1 and SU2 are calculated, respectively. Numerical results show that the more the primary user's traffic load, the more rapidly the SU2's cumulative handoff delay grows. Compared with the networks where secondary users are unitary, the lower the SUI's arrival rate, the more obviously both SUI's and SU2's handoff delays decrease. The admission access regions limited by the maximum tolerable delay can also facilitate the design of admission control rules for graded secondary users.
基金supported in part by the National Key Research and Development Program of China under Grant 2020YFA0711301in part by the National Natural Science Foundation of China under Grant U22A2002 and Grant 61922049。
文摘To cover remote areas where terrestrial cellular networks may not be available,non-terrestrial infrastructures such as satellites and unmanned aerial vehicles(UAVs)can be utilized in the upcoming sixth-generation(6G)era.Considering the spectrum scarcity problem,satellites and UAVs need to share the spectrum to save costs,leading to a cognitive satellite-UAV network.Due to the openness of both satellite links and UAV links,communication security has become a major concern in cognitive satelliteUAV networks.In this paper,we safeguard a cognitive satellite-UAV network from a physical layer security(PLS)perspective.Using only the slowlyvarying large-scale channel state information(CSI),we jointly allocate the transmission power and subchannels to maximize the secrecy sum rate of UAV users.The optimization problem is a mixed integer nonlinear programming(MINLP)problem with coupling constraints.We propose a heuristic algorithm which relaxes the coupling constraints by the penalty method and obtains a sub-optimal low-complexity solution by utilizing random matrix theory,the max-min optimization tool,and the bipartite graph matching algorithm.The simulation results corroborate the superiority of our proposed scheme.
基金supported partially by China's National 863 Program under Grant No.2009AA01Z207
文摘To improve spectrum utilization and minimize interference to Primary User (PU), an adaptive spectrum decision method is proposed for Secondary User (SU), while taking traffic load balancing and spectrum heterogeneity into consideration. Long-term statistics and current sensing results are integrated into the proposed decision method of spectrum access. Two decision methods, namely probability based and sensing based, are presented, compared and followed by performance analysis in terms of delay. For probability based spectrum decision, Short-Time-Job-First (STJF) priority queuing discipline is employed to minimize average residual time and theoretical conclusion is derived in a novel way. For sensing based decision we treat the interrupted service of SU as newly incoming and re-decision process is initialized to find available spectrum in a First-Available-First-Access (FAFA) fashion. Effect of sensing error in PHY layer is also analyzed in terms of extended average residual time. Simulation results show that, for relatively low arriving rate of SU traffic, the proposed spectrum decision method yields at least a delay reduction of 39.5% compared with non-adaptive method. The proposed spectrum decision can significantly improve delay performance even facing sensing errors, which cause performance degeneration to both PU and SU.
基金ACKNOWLEDGEMENT This work was partially supported by the Na- tional Natural Science Foundation of China under Grant No. 61071127 and the Science and Technology Department of Zhejiang Pro- vince under Grants No. 2012C01036-1, No. 2011R10035.
文摘Cooperative spectrum sensing in cog- nitive radio is investigated to improve the det- ection performance of Primary User (PU). Meanwhile, cluster-based hierarchical coop- eration is introduced for reducing the overhead as well as maintaining a certain level of sens- ing performance. However, in existing hierar- chically cooperative spectrum sensing algo- rithms, the robustness problem of the system is seldom considered. In this paper, we pro- pose a reputation-based hierarchically coop- erative spectrum sensing scheme in Cognitive Radio Networks (CRNs). Before spectrum sensing, clusters are grouped based on the location correlation coefficients of Secondary Users (SUs). In the proposed scheme, there are two levels of cooperation, the first one is performed within a cluster and the second one is carried out among clusters. With the reputa- tion mechanism and modified MAJORITY rule in the second level cooperation, the pro- posed scheme can not only relieve the influ- ence of the shadowing, but also eliminate the impact of the PU emulation attack on a rela- tively large scale. Simulation results show that, in the scenarios with deep-shadowing or mul- tiple attacked SUs, our proposed scheme ach- ieves a better tradeoff between the system robustness and the energy saving compared with those conventionally cooperative sensing schemes.
基金supported in part by the National Key Research and Development Program of China under Grant 2016QY01W0204in part by Key Industrial Innovation Chain in Industrial Domain under Grant 2016KTZDGY-02in part by National High-Level TalentsSpecial Support Program of China under Grant CS31117200001
文摘In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single PU in their frameworks. In this paper, we will consider a more complicated scenario with multiple PUs and try to investigate the cooperative jamming between multiple PUs and a single SU. When there are multiple PUs in CRN, in order to obtain more spectrum for data transmission, SU will cooperate with multiple PUs at the same time. Considering that both PU and SU are rational and selfish individuals, the interaction between PUs and SU is formulated as a multi-leaders and single-follower Stackelberg game, wherein PU is the leader and SU is the follower. And the Stackelberg Equilibrium(SE) is considered as the final decisions accepted by all PUs and SU. Furthermore, we also prove that when a specific condition is satisfied, the existence of SE can be guaranteed. And a Gauss-Jacobi iterative algorithm is proposed to compute a SE. Finally, simulation results are given to verify the performance and demonstrate that both of the PUs' secrecy rate and the SU's transmission rate can be improved through cooperation.
基金supported in part by the National Natural Science Foundation of China(Grant No.61472343)China Postdoctoral Science Foundation(Grant No.2014M56074)
文摘In this paper, the outage perfor- mance of a cognitive relaying network over Nakagami-m fading channels, employing simultaneous wireless information and power transfer (SWIPT) technology is analyzed and evaluated. The operation of this network is considered in conjunction with the convention- al decode-and-forward (DF) and incremental DF (IDF) protocols. For the conventional DF protocol, it is assumed that there is no direct link between the secondary transmitter (S) and the secondary destination (D), while (for both protocols) after harvesting energy, the relay node (R) always helps to forward the resulting signal to D. However, for the IDF protocol, R assists in relaying S's information to D only when the direct communication between S and D has failed. Furthermore, for both DF and IDF protocols, we assume there is no power supply for R, and R harvests energy from the transmitted signal of S. We derive exact ana- lytical expressions for the outage probability at D in DF and IDF protocols, respectively, in terms of the bivariate Meijer's G-function. Performance evaluation results obtained by means of Monte-Carlo simulations are also provided and have validated the correctness of the oroDosed analysis.
基金supported by the National Natural Science Foundation of China under Grant No. 61172068
文摘In the trust management scheme of the distributed cognitive radio networks, the absence of the central control devices cause many problems such as a lack of standardized control for trust computation, and the absence of the decision makers in trust evaluation and collaborative decision making. A trust management mechanism based on the jury system for distributed cognitive radio networks is proposed in this paper. The "jury user" is designed to collaboratively examine the reputation of the cognitive user in the networks and to perform data fusion and spectrum allocation for distributed cognitive radio networks. Simulation analysis results show that the proposed scheme can ensure accuracy and fairness in trust evaluation and improve effectiveness and flexibility of spectrum allocation.