2015
DOI: 10.1109/twc.2015.2440359
|View full text |Cite
|
Sign up to set email alerts
|

An Amplify-and-Forward Scheme for Spectrum Sharing in Cognitive Radio Channels

Abstract: In this paper, we propose a cognitive radio scheme that allows a secondary user (SU) to transmit over the same time-frequency slot of a primary user (PU), even when the PU is active. In our scheme, the SU amplifies and forwards the signal of the PU, by using as scaling factor the value of its information symbol to be transmitted towards the secondary receiver. The information-theoretic limits of the proposed protocol are investigated in terms of ergodic channel capacities of both the PU and SU links. It is sho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
26
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 25 publications
(26 citation statements)
references
References 49 publications
0
26
0
Order By: Relevance
“…where we have remembered that F (n) (m) = α H m x SU,I . The lower bound (28) boils down to that reported in [12], [13] when M vc = 0, L SU = 0 or, equivalently, N = 1, α m ≡ α m = 1, and γ m ≡ γ m = 0, for each m ∈ {0, 1, . .…”
Section: Worst-case Ergodic Capacity Of the Pumentioning
confidence: 60%
See 4 more Smart Citations
“…where we have remembered that F (n) (m) = α H m x SU,I . The lower bound (28) boils down to that reported in [12], [13] when M vc = 0, L SU = 0 or, equivalently, N = 1, α m ≡ α m = 1, and γ m ≡ γ m = 0, for each m ∈ {0, 1, . .…”
Section: Worst-case Ergodic Capacity Of the Pumentioning
confidence: 60%
“…In contrast, our scheme can achieve satisfactory data rates even without exploiting the (possible) presence of VCs, especially when the STx is sufficiently close to the SRx. In particular, when d 12 /d 14 > 0.3, the proposed scheme without VCs ensure a significant increase in data rate with respect to the NOCR scheme proposed in [12], [13] (see Fig. 7), which not only is unable to exploit the presence of the VCs, but also assumes the transmission of one SU symbol per PU data block, i.e, N = 1, and does not carry out the precoding of the SU data.…”
Section: B Performance Of the Secondary Systemmentioning
confidence: 93%
See 3 more Smart Citations