2022
DOI: 10.1109/tccn.2022.3149113
|View full text |Cite
|
Sign up to set email alerts
|

Multiuser Scheduling in Centralized Cognitive Radio Networks: A Multi-Armed Bandit Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 48 publications
0
6
0
Order By: Relevance
“…Each row of Z * corresponds to an efficient solution for a particular power level and contains the objective function value corresponding to the preferred solution selected in step 4 for that power level. Calculate the membership degree function matrix μF k i using ( 14) for the Z * matrix and μ k using (15). The solution with the largest value of μ k represents the most preferred solution, denoted by x * .…”
Section: Technique Complexitymentioning
confidence: 99%
See 2 more Smart Citations
“…Each row of Z * corresponds to an efficient solution for a particular power level and contains the objective function value corresponding to the preferred solution selected in step 4 for that power level. Calculate the membership degree function matrix μF k i using ( 14) for the Z * matrix and μ k using (15). The solution with the largest value of μ k represents the most preferred solution, denoted by x * .…”
Section: Technique Complexitymentioning
confidence: 99%
“…As far as the second issue is concerned, it is largely an open research question and a challenging problem as it involves multiple users and multichannel CRNs. 15 Therefore, in this work, our objective is to find an optimal channel assignment (CA) strategy that can efficiently utilize the radio resources provided that the SUs can sense the holes in the spectrum. By answering this question, we intend to address the issues faced by current and future IoT applications.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Above work most focused on collision avoidance between the SU and PU, while set access competition among the SU aside. To this end, multiuser OSA in CRN become a hot spot in recent years [20][21][22][23][24]. Given a centralized CRN in [20], a multi-armed bandit approach-based access/handoff scheduling algorithm was proposed for multiuser OSA.…”
Section: Introductionmentioning
confidence: 99%
“…To this end, multiuser OSA in CRN become a hot spot in recent years [20][21][22][23][24]. Given a centralized CRN in [20], a multi-armed bandit approach-based access/handoff scheduling algorithm was proposed for multiuser OSA. Introducing the non-orthogonal multiple access (NOMA) into a cognitive satellite-high altitude platform (HAP)-terrestrial network in [21], a subchannel and power joint allocation algorithm for SU was proposed to maximize the sum rate of the network.…”
Section: Introductionmentioning
confidence: 99%