Cognitive Radio in 4g/5g Wireless Communication Systems 2018
DOI: 10.5772/intechopen.82033
|View full text |Cite
|
Sign up to set email alerts
|

Introductory Chapter: Primary and Secondary Users in Cognitive Radio-Based Wireless Communication Systems

Abstract: Additional information is available at the end of the chapter 1. Wireless communications and the necessity of cognitive radio Wireless communication systems play a special role in human life, facilitate the life, and change the world much more in the future. The diversity of applications and services of wireless communications indicates the widespread use of wireless systems and equipment in the future. Since the first radio link by Marconi in 1896, it has been more than 120 years, and several wireless communi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…For one OFDM transmission, DSRC required 64 FFT subcarriers, while mobile networks required 256 FFT subcarriers. With DSRC OFDM, these FFT subcarriers are matched with padding zeros, making them comparable to the mobile network subcarrier [32][33][34]. Each OFDM symbol associated with I/Q signaling in this mathematical model will be:…”
Section: Mathematical Model For Physical Layer Ofdmmentioning
confidence: 99%
“…For one OFDM transmission, DSRC required 64 FFT subcarriers, while mobile networks required 256 FFT subcarriers. With DSRC OFDM, these FFT subcarriers are matched with padding zeros, making them comparable to the mobile network subcarrier [32][33][34]. Each OFDM symbol associated with I/Q signaling in this mathematical model will be:…”
Section: Mathematical Model For Physical Layer Ofdmmentioning
confidence: 99%
“…Furthermore, aspects of secure communication are also added and the power efficiency of the network is maximized under practical secrecy rate and energy harvesting constraints. In order to improve the secrecy rate of secondary users [96], techniques of multiple antennas, cooperative relaying, jamming and artificial noise aided techniques are used. The transmission beamforming and artificial noise aided covariance were jointly optimized to satisfy secrecy rates of both primary and secondary users [96] and energy harvesting of receivers.…”
Section: Practical Aspects Of Deploying Green Nomamentioning
confidence: 99%
“…In order to improve the secrecy rate of secondary users [96], techniques of multiple antennas, cooperative relaying, jamming and artificial noise aided techniques are used. The transmission beamforming and artificial noise aided covariance were jointly optimized to satisfy secrecy rates of both primary and secondary users [96] and energy harvesting of receivers. Power optimization was carried under both perfect CSI and bounded CSI error model.…”
Section: Practical Aspects Of Deploying Green Nomamentioning
confidence: 99%