2016
DOI: 10.1109/jcn.2016.000104
|View full text |Cite
|
Sign up to set email alerts
|

Mixed-integer programming based techniques for resource allocation in underlay cognitive radio networks: A survey

Abstract: For about the past decade and a half research efforts into cognitive radio networks (CRNs) have increased dramatically. This is because CRN is recognized as a technology that has the potential to squeeze the most out of the existing spectrum and hence virtually increase the effective capacity of a wireless communication system. The resulting increased capacity is still a limited resource and its optimal allocation is a critical requirement in order to realize its full benefits. Allocating these additional reso… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(12 citation statements)
references
References 94 publications
(220 reference statements)
0
12
0
Order By: Relevance
“…Pham et al's usage of a hidden Markov model (HMM) for CSS and spectrum hand-off in a CRN is unscalable due to the solution's completely cooperative character. Briefly put, traditional optimization techniques are unsuitable for CR-IoT applications due to the lack of a complete environment model [19], the fact that they are not scalable to support massive IoT connectivity [20,21], and the fact that they are unable to adapt to the changing and dynamic environments [21]. Many different intelligent MU detections have been developed by researchers for empowering user security such as FoF [22], TTA [23], and so on that are discovered with high accuracy.…”
Section: Optimization and Heuristic Approachesmentioning
confidence: 99%
“…Pham et al's usage of a hidden Markov model (HMM) for CSS and spectrum hand-off in a CRN is unscalable due to the solution's completely cooperative character. Briefly put, traditional optimization techniques are unsuitable for CR-IoT applications due to the lack of a complete environment model [19], the fact that they are not scalable to support massive IoT connectivity [20,21], and the fact that they are unable to adapt to the changing and dynamic environments [21]. Many different intelligent MU detections have been developed by researchers for empowering user security such as FoF [22], TTA [23], and so on that are discovered with high accuracy.…”
Section: Optimization and Heuristic Approachesmentioning
confidence: 99%
“…Since the domain of the objective is |B| ∈ N, P1 is a mixedinteger programming problem which is in general nondeterministic polynomial (NP) complete [32]. However, we can overcome this issue by searching over the space of candidate solutions for which the positions of the PBs are optimized.…”
Section: A Problem Formulationmentioning
confidence: 99%
“…To decrease the complexity of computational, most of the works assume a subset of the joint optimization problems [7][8][9][10][11]. Because the relay selection and channel assignment are naturally combinatorial, matching-based approaches are adopted in some articles [12][13][14][15]. The problems solved by the matching-based algorithms are mostly divided into three categories: one-to-one matching, many-to-one (known as college admission) matching, and many-to-many matching.…”
Section: Introductionmentioning
confidence: 99%