2017
DOI: 10.1049/iet-com.2016.0742
|View full text |Cite
|
Sign up to set email alerts
|

Robust resource allocation for orthogonal frequency division multiplexing‐based cooperative cognitive radio networks with imperfect channel state information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…(4) Determine gbest of the swarm from the total pbest value. (5) Update the velocity and position of every particle using (13) and (14). (6) Update the generation number using t � t + 1.…”
Section: Optimal Location and Operating Channel Selection Of A Secondmentioning
confidence: 99%
See 1 more Smart Citation
“…(4) Determine gbest of the swarm from the total pbest value. (5) Update the velocity and position of every particle using (13) and (14). (6) Update the generation number using t � t + 1.…”
Section: Optimal Location and Operating Channel Selection Of A Secondmentioning
confidence: 99%
“…In fact, how to improve resource allocation using a dynamic allocation policy in a CRN has always been a hot research area. Yang and Zhao [13] proposed a heuristic, robust, relay selection scheme and formulated robust power allocation as a semi-infinite program to maximize capacity while ensuring that interference with primary users is below a predefined interference threshold. Tiwari and Saha [14] presented a particle swarm optimization-(PSO-) based, cochannel interferenceconstrained, efficient, and low-complexity novel spectrum allocation scheme with simultaneous power and network capacity optimization.…”
Section: Introductionmentioning
confidence: 99%
“…However, without comprehensive cognitive capability, IoT is just like an awkward stegosaurus, all brawn and no brains. To fulfill its potential and deal with growing Li et al [4] Low -Good ---High Hong et al [5] Low ---Low --Baloch et al [6] Low -Poor -High Better -Zhu et al [7] Low --High -Good -Yang et al [8] Low -Good ----Bhardwaj et al [9] Low -Good High -Good Low Chen et al [10] Low Better -High --High Naser et al [11] Low ---Low --Feng et al [12] ---Low -Better - • used in developing resource constrained devices • useful for embedded system developers challenges, we must take the cognitive capability into consideration and empower IoT with high-level intelligence, i.e., brain-empowered IoT or CIoT. In this paper, we have analyzed some measures like energy consumption, network life time, resource allocation, throughput, time duration, quality of service and delay researched by various authors (Table 1).…”
Section: Introductionmentioning
confidence: 99%
“…In CRT Based Scheme, key is established in an efficient way for node addition, node compromise and also at regular intervals. The communication cost incurred at each node for establishing key is one receive operation and computation cost incurred is one modulus operation and one EX-OR operation by each node [11][12]. A deployment conscious security framework supporting, a shift of complex operations to more capable nodes of heterogeneous environment and relieving resource constrained generic sensor nodes of major activities is introduced in [13][14][15].…”
Section: Introductionmentioning
confidence: 99%