2016 IEEE 84th Vehicular Technology Conference (VTC-Fall) 2016
DOI: 10.1109/vtcfall.2016.7881003
|View full text |Cite
|
Sign up to set email alerts
|

EVM Based Primary User Monitoring in Cognitive Radio Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
7
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 18 publications
1
7
0
Order By: Relevance
“…Hence, it is of crucial importance to design a system that can detect the incumbent PU efficiently and robustly. This process of detecting the PU during SU transmission is termed spectrum monitoring which has been noted in [3–6]. The method in [3] uses periodic spectrum sensing where SU transmission is switched off every once in a while to create a silent sensing interval for probing the channel which makes it spectrally inefficient and results in a sensing throughput tradeoff.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Hence, it is of crucial importance to design a system that can detect the incumbent PU efficiently and robustly. This process of detecting the PU during SU transmission is termed spectrum monitoring which has been noted in [3–6]. The method in [3] uses periodic spectrum sensing where SU transmission is switched off every once in a while to create a silent sensing interval for probing the channel which makes it spectrally inefficient and results in a sensing throughput tradeoff.…”
Section: Introductionmentioning
confidence: 99%
“…The method in [3] uses periodic spectrum sensing where SU transmission is switched off every once in a while to create a silent sensing interval for probing the channel which makes it spectrally inefficient and results in a sensing throughput tradeoff. The spectrum monitoring methods employed in [4–6] are done on the SU receiver during the reception of packets, so that communication can occur at the same time as monitoring is performed and no quiet period is required as in [3]. The idea in [4] is to compare the bit error count for each received packet to a threshold value.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations