2015
DOI: 10.1049/iet-com.2014.1246
|View full text |Cite
|
Sign up to set email alerts
|

Energy efficient relay selection and power allocation for cooperative cognitive radio networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
27
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 35 publications
(27 citation statements)
references
References 26 publications
0
27
0
Order By: Relevance
“…where O 1 denotes the event that SU n cannot detect x p and x s , and O 2 denotes the event that though x p and x s can be detected by SU n, either the PU or SU n ′ (n ′ represents the SU whose relaying channel is the weakest) is in outage. From (17), P(O 1 ) can be further written as…”
Section: A User Scheduling Without Instantaneous Csimentioning
confidence: 99%
See 2 more Smart Citations
“…where O 1 denotes the event that SU n cannot detect x p and x s , and O 2 denotes the event that though x p and x s can be detected by SU n, either the PU or SU n ′ (n ′ represents the SU whose relaying channel is the weakest) is in outage. From (17), P(O 1 ) can be further written as…”
Section: A User Scheduling Without Instantaneous Csimentioning
confidence: 99%
“…As such, by substituting the results derived in Appendix A into (17), an explicit expression of P mop can be obtained immediately.…”
Section: A User Scheduling Without Instantaneous Csimentioning
confidence: 99%
See 1 more Smart Citation
“…Cognitive radio (CR) is widely recognized as a promising solution to the lack of wireless spectrum resources . The secondary users (SUs) can borrow the authorized spectrum of the primary user (PU) when the interference caused by SUs is tolerable to the PU .…”
Section: Introductionmentioning
confidence: 99%
“…Cognitive radio (CR) is widely recognized as a promising solution to the lack of wireless spectrum resources. [3][4][5] The secondary users (SUs) can borrow the authorized spectrum of the primary user (PU) when the interference caused by SUs is tolerable to the PU. 6 Meanwhile, the nonorthogonal multiple access (NOMA) technology is another promising multiple access (MA) technology that improves the access efficiency of the future mobile networks.…”
Section: Introductionmentioning
confidence: 99%