SlideShare a Scribd company logo
1 of 7
Download to read offline
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1866

Abstract—
Spectrum scarcity is one of the most critical recent problems in
the field of wireless communication. One of the promising
approaches to resolve this issue is the use of Cognitive Radio
technique. CR technique is performed by Secondary User (SU)
to utilize the spectrums more efficiently. SU transmission mode
can be broadly divided into two modes: interference avoidance
mode (white space) and interference management mode (black
and gray space). In this paper, interference avoidance mode is
considered. The interference avoidance mode is often referred to
as interweave access. In interweave access method, SU finds the
spectrum hole by sensing the radio frequency. Here we have
used continuous time Markov chain model to calculate QoS
parameter of the SU for fixed payload length and exponential
distribution payload length for a single channel of PU and SU.
Numerical results show that the blocking probability and force
termination probability are greater in fixed payload length than
in exponential distribution payload length.
Index Terms—— wireless communication; interweave access;
cognitive radio; blocking probability; force termination
probability; CTMC model.
I. INTRODUCTION
The demand for spectrum access is growing rapidly in
wireless communication. Therefore, an efficient spectrum
management and spectrum access techniques are needed.
However, studies on spectrum usage have revealed that most
of the allotted spectrum is not used efficiently due to the static
frequency allocation methods. With the evolution of cognitive
radio, spectrum access techniques shift from static spectrum
allocation to dynamic allocation. CR enables the secondary
user (SU) to build transmission links in vacant PU channels
such that there is no/minimum interference to PUs. CR has the
following functionalities: spectrum sensing; spectrum access;
spectrum allocation and management among different SUs.
SU transmission modes can be broadly categorized into two
modes: interference avoidance (white space) mode and the
Interference management (black and grey space) mode [1].
The interference avoidance mode is often termed as
interweave access. In interweave access, the SU finds
spectrum holes (white space) by sensing the radio frequency
spectrum. These spectrum holes are used by the SU for its
Pinki Yadav1
, Department of Electronics and Communication
Engineering Faculty of Engineering and Technology Mody Institute of
Technology & Science (Deemed University) Lakshmangarh, Dist. Sikar,
Rajasthan, Pin-332311,India ,
Partha Pratim Bhattacharya2
, Department of Electronics and
Communication Engineering Faculty of Engineering and Technology Mody
Institute of Technology & Science (Deemed University) Lakshmangarh,
Dist. Sikar, Rajasthan, Pin-332311,India,
transmission. This scheme is often referred to as opportunistic
spectrum access (OSA) [1]. On the other hand the interference
management mode in a CR can be categorized as overlay and
underlay. The underlay approach assumes that a PU transmits
all the time and imposes severe restrictions on the
transmission power of a SU. The overlay approach relies on
spectrum holes detection by SU in the network and does not
impose severe restrictions on their transmission power [2].
In this paper, the quality of service of secondary users is
analyzed in an interweave access scenario. A continuous time
Markov model is used to calculate the forced termination
probability and blocking probability. Here Simple closed
form expressions for the forced termination probability,
blocking probability are derived for both fixed and
exponential payload lengths [3].
II. SYSTEM MODEL
A widely acceptable spectrum pooling model [4] is
adopted, in which a vacant wideband PU channel is divided
into multiple narrowband sub channels. These narrowband
sub channels are used by SU groups for their opportunistic
transmissions. Fig.1 shows the system model, in which there
is K available PU channels k . Each of the PU
channels has a fixed bandwidth Wp, which is subdivided into
N sub channels of bandwidth, Ws = W=Np. We consider
spectrum sharing scenarios: a single SU group is interweaving
the PU channels, denoted by S1.
Fig. 1 Channel arrangements of PU and SU Channels
1) The service duration of the PU connections are assumed to
be exponentially distributed with a mean 1/ . The arrival of
new connections from the PU group follows a Poisson
process with a mean rate .
2) PU network is an M/M/m/m loss network. In this network
channel occupancy only depends on the mean service rate of
PU group.
Performance Study of Interweave Spectrum Sharing
Method in Cognitive Radio
Pinki Yadav1
, Partha Pratim Bhattacharya2
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1867
www.ijarcet.org
3) In a single PU channel and single SU channel group two
types of SU connections are considered: fixed header with
fixed payload and fixed header with exponentially distributed
payload.
The fixed header duration is denoted by 1/ , the fixed
payload length denoted by 1/ , and the mean exponential
payload length is denoted by 1/ . The Poisson arrival rate of
a single SU group is denoted by .
III. PERFORMANCE ANALYSIS
CTMC is used the spectrum sharing scenario between the
PU and SU groups. CTMC has been extensively used in
conventional cellular systems to model the cell residence
time1, call dropping probability and handover probability [5].
In these scenarios, the birth-death process (often referred to as
a loss system) is one of the commonly used CTMC models. In
a CTMC model, the number of connections from the user
groups are represented by states (written as n tuples), such as
(x1, x2), where x1 and x2 may represent the number of PU and
SU connections. The transition of one state to another is based
on the Markov property [6] which assumes memory less
arrivals and departures. Under stationary assumptions, the
rate of transition from and to a state is equal. This
fundamental fact is used to calculate the state probabilities
under the constraint that the sum of all state probabilities is
equal to 1.
A. Fixed Payload Length
When the payload is fixed, the total connection length can
be expressed by the sum of the overhead and payload length,
i.e. [3]
(1)
When the fixed length SU connection on the channel, the
system is not purely Markovian and also it cannot represent
by a simple birth-death process. In this approach, the
connection with fixed length is replaced by a continuous
group of Y exponentially distributed connection which are
independent and identically distributed (i.i.d.). The total
length of this Y i.i.d. connection is Erlang distributed and
individual connection has an average length of 1/ Y . It is
well established that as Y , then the total length is the
same as the fixed length connections 1/ .
Science the fixed length connection is replaced by a group
of Y i.i.d connection, a Y node CTMC is used the number of
the arrivals of the connection in the group, and i.e. the yth node
models the arrival of the connection in the group. These
states are referred to as the phases of a fixed SU connection
[6]. Complete CTMC model is shown in Fig.2, where the
state is (i; j; y), where, i and k ( represents the
presence (1) and absence (0) of a SU and PU connection on
the channel, 1≤y≤Y represents the phases of a SU
connection when i=1 shown in fig. The total mean departure
rate from each phase of the SU connection is (Y ),
where Y is the completion rate of each i.i.d connection
and ), is the termination rate due to the arrival of a PU
connection. A set of balance equations for the CTMC in
figure is given as
(a)
(b)
Fig. 2. CTMC model of SU connections with fixed
payload
( + ) P(0,0,0)= P(0,1,0)+Y P(1,0,Y);
Y P (1, 0, 1) = P (0, 0, 0);
(Y + )P (1, 0, 2) =Y P (1, 0, 1);
.
. (2)
.
.
.
(Y + ) P (1, 0, Y) =Y P (1, 0, Y-1)
Such that
(3)
Where, P (i; k; y) represents the probability of the state (i;
k; y). By simple algebraic manipulation of equations in (2),
the probability of the phase P (1; 0; y) in terms of P (0, 0,
and 0) can be written as [3]
(4)
i, k, y
Phase of SU connection
when
i=1
i=1 -- Active SU
connection
i=0 -- Inactive SU
connection
k=1 -- Active PU connection
k=0 -- Inactive PU connection
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1868
Using P (i; k; y), the expression for the force termination
probability, blocking probability and throughput are derived.
1) Blocking probability: In Fig. 2(b), an incoming SU
connection is blocked when the channel is occupied by a PU
or SU connection. The blocking probability in this
scenario can be expressed as [3]
1-P (0, 0, 0) (5)
Since the arrival of a PU connection is in dependent of a SU
connection, the Probability of a PU connection on the channel
P (0, 1, and 0) can be written as
(6)
Using (2), (4) and (6), the blocking probability of a SU
connection with Erlang-Y distributed connection length has
the following mathematical expression
(7)
Let the blocking probability of
SU connections with fixed payload length becomes
(8)
2) Force termination probability: Forced termination
probability is defined as the probability that an ongoing SU
connection is terminated prematurely. Based on the fact that
the sum of forced and unforced termination rates equals to the
incoming connection rate, the forced termination probability
can be written as [3]
(9)
Using (9), the forced termination probability of SU with
Erlang-Y distributed connection length can be written as
(10)
Using (2) and (5), can be expressed as
(11)
Note that the geometric series in the above equation is
convergent (common ratio ); hence (11) can be
simplified to
(12)
Let be the force termination
probability of SU connection with fixed payload. The
can be written as
(13)
B. Exponential Payload Length
In the following, the forced termination probability,
blocking probability of the SU connection with a fixed header
and exponentially distributed payload length are calculated.
Fig. 3 CTMC model of SU connections with fixed header and exponentially
distributed payload.
Fig. 3 shows that the CTMC of the system. In this figure the
states (1, 0, y), y= {1….Y} represent the phases of fixed
header portion, whereas the state (1, 0, 0) represents the
exponentially distributed payload portion. Similarly to the
fixed header length 1/ is modeled as limiting case of
Erlang-Y distribution, and exponentially distributed payload
length is given by 1/ . The global balance equation of the
above system is as follows [7]
( + ) P (0, 0, 0) = P (0, 1, 0) + . P (1, 0, 0),
(Y + )P (1, 0, 1) = P (0, 0, 0),
(Y + )P (1, 0, 2) =Y P (1, 0, 1),
.
. (14)
.
.
.
(Y + )P (1, 0, Y) =Y P (1, 0, Y-1),
( + .) P (1, 0, 0) = Y P (1, 0, Y),
1) Blocking probability: - Solving (14) for P (0; 0; 0) and
using (5), the blocking probability of the SU connection can
be written as
(15)
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1869
www.ijarcet.org
In the limit is the blocking
probability of SU connections with exponentially distributed
payload length. It can be shown that [7]
(16)
2) Force termination Probability: The force termination
probability can be calculated by using the definition in (9). In
this scenario the force termination probability [7]
(17)
Using the balance equation (14) the can be
expressed as
(18)
In the limit, let be the force
termination probability of SU connection with exponentially
payload length.
(19)
(20)
Where and .
IV. NUMERICAL RESULT
In this section, we have shown some numerical examples of
the forced termination probability and blocking probability
with fixed and exponentially distributed payload length. The
Fig. 4 shows the blocking probability for fixed payload length
( for different value of mean header duration (1/ .
So it is clear from the figure when mean payload length
increases (1/ , blocking probability decreases and also
analyzed when mean header duration (1/ increases,
blocking probability also increases.
Fig. 4 Blocking probability for fixed payload against mean payload length
for different mean header duration
Fig. 5 Force termination probability for fixed payload against mean payload
length for different mean header duration
The Fig. 5 shows the force termination probability for fixed
payload length ( for different value of mean header
duration (1/ . So it is clear from the figure when mean
payload length increases (1/ , force termination
probability increases and also analyzed when mean header
duration (1/ increases, force termination probability also
increases.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1870
Fig. 6 Blocking probability ( for exponential distribution payload
payload against mean payload length for different mean header duration
The Fig. 6 shows the blocking probability for exponential
distributed payload length ( for different value of
mean header duration (1/ . So it is clear from the figure
when mean payload length increases (1/ , blocking
probability decreases and also analyzed when mean header
duration (1/ increases, blocking probability also increases.
Fig. 7 Force termination probability ( for exponential distribution
against mean payload length for different mean header duration
The Fig.7 shows the force termination probability for fixed
payload length ( for different value of mean header
duration (1/ . So it is clear from the figure when mean
payload length increases (1/ , force termination
probability increases and also analyzed when mean header
duration (1/ increases, force termination probability also
increases.
The Fig.8 shows the blocking probability for fixed payload
length ( against arrival rate of SU for different value
of mean header duration (1/ . So it is clear from the figure
when arrival rate of SU increases ( , blocking probability
increases and also analyzed when mean header duration
(1/ increases, blocking probability also decreases.
Fig.9 shows the blocking probability for exponential
distributed payload length against arrival rate of SU
for different value of mean header duration. In this figure
when arrival rate of SU increases, blocking probability
increases, but when mean header length increases blocking
probability also increases.
Fig. 8 Blocking probability for fixed payload against arrival rate of SU for
different mean header duration
Fig. 9 Blocking probability for exponential distributed payload
against arrival rate of SU for different mean header duration
A. Comparison between fixed and exponential payload
length
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1871
www.ijarcet.org
Fig. 10 Comparison between Blocking probability for fixed ( and
exponential payload ( length against mean payload (1/ )
In Fig. 10 shows the Comparison between Blocking
probability for fixed ( and exponential payload
( length against mean payload (1/ ) for
mean header duration ( =0.1. So it is clear from the
figure blocking probability decreases when mean payload
length increase and also observe the exponential distribution
of blocking probability are lower than the fixed payload
blocking probability.
Fig. 11 Comparison between Force termination probability for fixed
( and exponential payload ( length against mean payload
(1/ )
In Fig. 11 shows that the Comparison between Force
termination probability for fixed ( and exponential
payload ( length against mean payload
(1/ ) for mean header duration ( =0.1. So it
is clear from the figure force termination probability increases
when mean payload length increase and also observe the
exponential distribution of force termination probability are
lower than the fixed payload force termination probability.
In Fig. 12 shows that the Comparison between Blocking
probability for fixed ( and exponential payload
( length against arrival rate of SU for mean header
duration ( =0.1. So it is clear from the figure blocking
probability increases when arrival rate of SU increase and
also observe the exponential distribution of blocking
probability are lower than the fixed payload blocking
probability.
Fig. 12 Comparison between Blocking probability for fixed ( and
exponential payload ( length against arrival rate of SU
V. CONCLUSION
In this paper, we have used a continuous time markov chain
model to calculate QoS parameter of the SU for fixed payload
length and exponential distribution payload length with fixed
header using a single channel of PU and SU. Numerical
results are shown and compared with those of fixed header
duration. Results show that the blocking probability and force
termination probability is greater in fixed payload length
rather than exponential distribution payload length.
This work may further be extended for multiple PU
channel and two SU groups with spectrum handoff and
channel reservation in interweave access mode.
REFERENCES
[1] Sudhir Srinivasa and Syed Ali Jafar, “The Throughput Potential of
Cognitive Radio: A Theoretical Perspective”, IEEE Communications
Magazine, May 2007 pp.73-79.
[2] Qing Zhao and Brian M. Sadler, “A Survey of Dynamic Spectrum
Access”, IEEE Signal Processing Magazine, May 2007 pp.79-89
[3] W. Ahmed, J. Gao, H. Zhou and M. Faulkner, “Goodput and Channel
allocation," in Proceedings Personal Indoor and Mobile Radio
Communications (PIMRC), pp. 476-480, 13-16 Sept. 2009.
[4] T. Weiss and F. Jondral, “Spectrum Pooling: An Innovative Strategy
for the Enhancement of Spectrum Efficiency," IEEE Communication.
Mag., vol. 42, pp. S8- S14, Mar. 2004.
[5] D. Hong and S. Rappaport, “Traffic Model and Performance Analysis
for Cellular Mobile Radio Telephone Systems with Prioritized and
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1872
Nonprioritized Handoff Procedures," IEEE Transactions. Vehicular.
Technol., vol. 35, pp. 77-92, Aug. 1986.
[6] J. Mehdi, Stochastic Models in Queuing Theory. Academic Press, San
Diego: CA, 1991.
[7] J. Gao, W. Ahmed, J. Yang, and M. Faulkner, “Throughput
Comparison in Cognitive Radio Networks," in Proceedings of
Electrical Engineering/Electronics Computer Telecommunications
and Information Technology (ECTI-CON), pp. 748-751, 19-21 May
2010.
Pinki Yadav was born in India on February 2,
1987. She received her B.E. degree in Electronics
and Communication from Mandsaur institute of
technology, Mandsaur (University RGPV Bhopal),
M.P. India in 2010 and currently is a M. Tech
(Signal Processing) student in Mody Institute of
Technology and Science (Deemed University),
Rajasthan, India.
Dr. Partha Pratim Bhattacharya was born in
India on January 3, 1971. He has 15 years of
experience in teaching and research. He served
many reputed educational Institutes in India in
various positions starting from Lecturer to
Professor and Principal. At present he is working as
Professor in Department of Electronics and
Communication Engineering in the Faculty of
Engineering and Technology, Mody Institute of Technology and Science
(Deemed University), Rajasthan, India. He worked on Microwave devices
and systems and mobile cellular communication systems. He has published a
good number of papers in refereed journals and conferences. His present
research interest includes mobile communication and cognitive radio. Dr.
Bhattacharya is a member of The Institution of Electronics and
Telecommunication Engineers, India and The Institution of Engineers, India.
He is the recipient of Young Scientist Award from International Union of
Radio Science in 2005. He is working as the chief editor, editorial board
member and reviewer in many reputed journals.

More Related Content

What's hot

Haqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manetsHaqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manetscsandit
 
MM-PNEMO: a mathematical model to assess handoff delay and packet loss
MM-PNEMO: a mathematical model to assess handoff delay and packet lossMM-PNEMO: a mathematical model to assess handoff delay and packet loss
MM-PNEMO: a mathematical model to assess handoff delay and packet lossjournalBEEI
 
General analytical framework for cooperative sensing and access trade-off opt...
General analytical framework for cooperative sensing and access trade-off opt...General analytical framework for cooperative sensing and access trade-off opt...
General analytical framework for cooperative sensing and access trade-off opt...Polytechnique Montreal
 
IMPACT OF FADING CORRELATION, POLARIZATION COUPLING AND KEYHOLES ON MIMO DETE...
IMPACT OF FADING CORRELATION, POLARIZATION COUPLING AND KEYHOLES ON MIMO DETE...IMPACT OF FADING CORRELATION, POLARIZATION COUPLING AND KEYHOLES ON MIMO DETE...
IMPACT OF FADING CORRELATION, POLARIZATION COUPLING AND KEYHOLES ON MIMO DETE...ijmnct
 
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...IJCNCJournal
 
A new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsA new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsTELKOMNIKA JOURNAL
 
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...IJCSEA Journal
 
1_VTC_Qian
1_VTC_Qian1_VTC_Qian
1_VTC_QianQian Han
 
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...ijwmn
 
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...cscpconf
 
Multiuser MIMO Channel Estimation
Multiuser MIMO Channel Estimation Multiuser MIMO Channel Estimation
Multiuser MIMO Channel Estimation IJERA Editor
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...journalBEEI
 
18 15993 31427-1-sm(edit)nn
18 15993 31427-1-sm(edit)nn18 15993 31427-1-sm(edit)nn
18 15993 31427-1-sm(edit)nnIAESIJEECS
 

What's hot (19)

Haqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manetsHaqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manets
 
MM-PNEMO: a mathematical model to assess handoff delay and packet loss
MM-PNEMO: a mathematical model to assess handoff delay and packet lossMM-PNEMO: a mathematical model to assess handoff delay and packet loss
MM-PNEMO: a mathematical model to assess handoff delay and packet loss
 
General analytical framework for cooperative sensing and access trade-off opt...
General analytical framework for cooperative sensing and access trade-off opt...General analytical framework for cooperative sensing and access trade-off opt...
General analytical framework for cooperative sensing and access trade-off opt...
 
IMPACT OF FADING CORRELATION, POLARIZATION COUPLING AND KEYHOLES ON MIMO DETE...
IMPACT OF FADING CORRELATION, POLARIZATION COUPLING AND KEYHOLES ON MIMO DETE...IMPACT OF FADING CORRELATION, POLARIZATION COUPLING AND KEYHOLES ON MIMO DETE...
IMPACT OF FADING CORRELATION, POLARIZATION COUPLING AND KEYHOLES ON MIMO DETE...
 
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
 
40120140503007
4012014050300740120140503007
40120140503007
 
A new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsA new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocols
 
Hg3413361339
Hg3413361339Hg3413361339
Hg3413361339
 
Performance of cooperative spectrum sensing for different number of cr users ...
Performance of cooperative spectrum sensing for different number of cr users ...Performance of cooperative spectrum sensing for different number of cr users ...
Performance of cooperative spectrum sensing for different number of cr users ...
 
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...
 
1_VTC_Qian
1_VTC_Qian1_VTC_Qian
1_VTC_Qian
 
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...
 
218
218218
218
 
Q01742112115
Q01742112115Q01742112115
Q01742112115
 
N017428692
N017428692N017428692
N017428692
 
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
 
Multiuser MIMO Channel Estimation
Multiuser MIMO Channel Estimation Multiuser MIMO Channel Estimation
Multiuser MIMO Channel Estimation
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...
 
18 15993 31427-1-sm(edit)nn
18 15993 31427-1-sm(edit)nn18 15993 31427-1-sm(edit)nn
18 15993 31427-1-sm(edit)nn
 

Viewers also liked

ISD2016_Solution_I_Felix_Fischer
ISD2016_Solution_I_Felix_FischerISD2016_Solution_I_Felix_Fischer
ISD2016_Solution_I_Felix_FischerInfoSocietyDays
 
InfoSocietyDays2016_Matthias_Stürmer
InfoSocietyDays2016_Matthias_StürmerInfoSocietyDays2016_Matthias_Stürmer
InfoSocietyDays2016_Matthias_StürmerInfoSocietyDays
 
Does deliberation reduce the gap between citizens' and legislator's ethical ...
Does deliberation reduce the gap between citizens' and legislator's  ethical ...Does deliberation reduce the gap between citizens' and legislator's  ethical ...
Does deliberation reduce the gap between citizens' and legislator's ethical ...kai-arzheimer
 
Sports Ethics Final Portfolio
Sports Ethics Final PortfolioSports Ethics Final Portfolio
Sports Ethics Final PortfolioKevin Page
 

Viewers also liked (6)

ISD2016_Solution_I_Felix_Fischer
ISD2016_Solution_I_Felix_FischerISD2016_Solution_I_Felix_Fischer
ISD2016_Solution_I_Felix_Fischer
 
InfoSocietyDays2016_Matthias_Stürmer
InfoSocietyDays2016_Matthias_StürmerInfoSocietyDays2016_Matthias_Stürmer
InfoSocietyDays2016_Matthias_Stürmer
 
Intriducing HEXACON inspires Poetry
Intriducing HEXACON inspires PoetryIntriducing HEXACON inspires Poetry
Intriducing HEXACON inspires Poetry
 
Does deliberation reduce the gap between citizens' and legislator's ethical ...
Does deliberation reduce the gap between citizens' and legislator's  ethical ...Does deliberation reduce the gap between citizens' and legislator's  ethical ...
Does deliberation reduce the gap between citizens' and legislator's ethical ...
 
Sports Ethics Final Portfolio
Sports Ethics Final PortfolioSports Ethics Final Portfolio
Sports Ethics Final Portfolio
 
La web 2.0
La web 2.0La web 2.0
La web 2.0
 

Similar to 1866 1872

Effective capacity in cognitive radio broadcast channels
Effective capacity in cognitive radio broadcast channelsEffective capacity in cognitive radio broadcast channels
Effective capacity in cognitive radio broadcast channelsMarwan Hammouda
 
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...
 SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO... SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...ijmnct
 
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...ijmnct
 
Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cog...
Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cog...Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cog...
Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cog...ijmnct
 
OPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKS
OPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKSOPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKS
OPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKSijwmn
 
Medium Access Probability of Cognitive Radio Network Under ECC-33/Hata-Okumur...
Medium Access Probability of Cognitive Radio Network Under ECC-33/Hata-Okumur...Medium Access Probability of Cognitive Radio Network Under ECC-33/Hata-Okumur...
Medium Access Probability of Cognitive Radio Network Under ECC-33/Hata-Okumur...ijceronline
 
Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...TELKOMNIKA JOURNAL
 
Adaptive resources assignment in OFDM-based cognitive radio systems
Adaptive resources assignment in OFDM-based cognitive radio systemsAdaptive resources assignment in OFDM-based cognitive radio systems
Adaptive resources assignment in OFDM-based cognitive radio systemsIJECEIAES
 
Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks IJECEIAES
 
The impact of M-ary rates on various quadrature amplitude modulation detection
The impact of M-ary rates on various quadrature amplitude  modulation detectionThe impact of M-ary rates on various quadrature amplitude  modulation detection
The impact of M-ary rates on various quadrature amplitude modulation detectionIJECEIAES
 
Spectrum sensing performance of cognitive radio under awgn and fading channel...
Spectrum sensing performance of cognitive radio under awgn and fading channel...Spectrum sensing performance of cognitive radio under awgn and fading channel...
Spectrum sensing performance of cognitive radio under awgn and fading channel...eSAT Journals
 
Outage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channelOutage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channeleSAT Publishing House
 
MAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksMAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksPolytechnique Montreal
 
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...IJERA Editor
 
Channel characterization and modulation schemes of ultra wideband systems
Channel characterization and modulation schemes of ultra wideband systemsChannel characterization and modulation schemes of ultra wideband systems
Channel characterization and modulation schemes of ultra wideband systemsijmnct
 
System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...Alexander Decker
 
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAV.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAKARTHIKEYAN V
 
V.karthikeyan published article1
V.karthikeyan published article1V.karthikeyan published article1
V.karthikeyan published article1KARTHIKEYAN V
 

Similar to 1866 1872 (20)

Effective capacity in cognitive radio broadcast channels
Effective capacity in cognitive radio broadcast channelsEffective capacity in cognitive radio broadcast channels
Effective capacity in cognitive radio broadcast channels
 
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...
 SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO... SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...
 
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...
 
Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cog...
Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cog...Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cog...
Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cog...
 
OPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKS
OPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKSOPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKS
OPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKS
 
Medium Access Probability of Cognitive Radio Network Under ECC-33/Hata-Okumur...
Medium Access Probability of Cognitive Radio Network Under ECC-33/Hata-Okumur...Medium Access Probability of Cognitive Radio Network Under ECC-33/Hata-Okumur...
Medium Access Probability of Cognitive Radio Network Under ECC-33/Hata-Okumur...
 
Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...
 
Adaptive resources assignment in OFDM-based cognitive radio systems
Adaptive resources assignment in OFDM-based cognitive radio systemsAdaptive resources assignment in OFDM-based cognitive radio systems
Adaptive resources assignment in OFDM-based cognitive radio systems
 
Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks
 
The impact of M-ary rates on various quadrature amplitude modulation detection
The impact of M-ary rates on various quadrature amplitude  modulation detectionThe impact of M-ary rates on various quadrature amplitude  modulation detection
The impact of M-ary rates on various quadrature amplitude modulation detection
 
A NOVEL ENERGY EFFICIENT TECHNIQUE FOR COGNITIVE RADIO NETWORKS
A NOVEL ENERGY EFFICIENT TECHNIQUE FOR COGNITIVE RADIO NETWORKSA NOVEL ENERGY EFFICIENT TECHNIQUE FOR COGNITIVE RADIO NETWORKS
A NOVEL ENERGY EFFICIENT TECHNIQUE FOR COGNITIVE RADIO NETWORKS
 
Spectrum sensing performance of cognitive radio under awgn and fading channel...
Spectrum sensing performance of cognitive radio under awgn and fading channel...Spectrum sensing performance of cognitive radio under awgn and fading channel...
Spectrum sensing performance of cognitive radio under awgn and fading channel...
 
Outage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channelOutage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channel
 
MAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksMAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio Networks
 
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
 
Channel characterization and modulation schemes of ultra wideband systems
Channel characterization and modulation schemes of ultra wideband systemsChannel characterization and modulation schemes of ultra wideband systems
Channel characterization and modulation schemes of ultra wideband systems
 
System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...
 
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAV.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
 
V.karthikeyan published article1
V.karthikeyan published article1V.karthikeyan published article1
V.karthikeyan published article1
 
Bd4103341345
Bd4103341345Bd4103341345
Bd4103341345
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

1866 1872

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 www.ijarcet.org 1866  Abstract— Spectrum scarcity is one of the most critical recent problems in the field of wireless communication. One of the promising approaches to resolve this issue is the use of Cognitive Radio technique. CR technique is performed by Secondary User (SU) to utilize the spectrums more efficiently. SU transmission mode can be broadly divided into two modes: interference avoidance mode (white space) and interference management mode (black and gray space). In this paper, interference avoidance mode is considered. The interference avoidance mode is often referred to as interweave access. In interweave access method, SU finds the spectrum hole by sensing the radio frequency. Here we have used continuous time Markov chain model to calculate QoS parameter of the SU for fixed payload length and exponential distribution payload length for a single channel of PU and SU. Numerical results show that the blocking probability and force termination probability are greater in fixed payload length than in exponential distribution payload length. Index Terms—— wireless communication; interweave access; cognitive radio; blocking probability; force termination probability; CTMC model. I. INTRODUCTION The demand for spectrum access is growing rapidly in wireless communication. Therefore, an efficient spectrum management and spectrum access techniques are needed. However, studies on spectrum usage have revealed that most of the allotted spectrum is not used efficiently due to the static frequency allocation methods. With the evolution of cognitive radio, spectrum access techniques shift from static spectrum allocation to dynamic allocation. CR enables the secondary user (SU) to build transmission links in vacant PU channels such that there is no/minimum interference to PUs. CR has the following functionalities: spectrum sensing; spectrum access; spectrum allocation and management among different SUs. SU transmission modes can be broadly categorized into two modes: interference avoidance (white space) mode and the Interference management (black and grey space) mode [1]. The interference avoidance mode is often termed as interweave access. In interweave access, the SU finds spectrum holes (white space) by sensing the radio frequency spectrum. These spectrum holes are used by the SU for its Pinki Yadav1 , Department of Electronics and Communication Engineering Faculty of Engineering and Technology Mody Institute of Technology & Science (Deemed University) Lakshmangarh, Dist. Sikar, Rajasthan, Pin-332311,India , Partha Pratim Bhattacharya2 , Department of Electronics and Communication Engineering Faculty of Engineering and Technology Mody Institute of Technology & Science (Deemed University) Lakshmangarh, Dist. Sikar, Rajasthan, Pin-332311,India, transmission. This scheme is often referred to as opportunistic spectrum access (OSA) [1]. On the other hand the interference management mode in a CR can be categorized as overlay and underlay. The underlay approach assumes that a PU transmits all the time and imposes severe restrictions on the transmission power of a SU. The overlay approach relies on spectrum holes detection by SU in the network and does not impose severe restrictions on their transmission power [2]. In this paper, the quality of service of secondary users is analyzed in an interweave access scenario. A continuous time Markov model is used to calculate the forced termination probability and blocking probability. Here Simple closed form expressions for the forced termination probability, blocking probability are derived for both fixed and exponential payload lengths [3]. II. SYSTEM MODEL A widely acceptable spectrum pooling model [4] is adopted, in which a vacant wideband PU channel is divided into multiple narrowband sub channels. These narrowband sub channels are used by SU groups for their opportunistic transmissions. Fig.1 shows the system model, in which there is K available PU channels k . Each of the PU channels has a fixed bandwidth Wp, which is subdivided into N sub channels of bandwidth, Ws = W=Np. We consider spectrum sharing scenarios: a single SU group is interweaving the PU channels, denoted by S1. Fig. 1 Channel arrangements of PU and SU Channels 1) The service duration of the PU connections are assumed to be exponentially distributed with a mean 1/ . The arrival of new connections from the PU group follows a Poisson process with a mean rate . 2) PU network is an M/M/m/m loss network. In this network channel occupancy only depends on the mean service rate of PU group. Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio Pinki Yadav1 , Partha Pratim Bhattacharya2
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1867 www.ijarcet.org 3) In a single PU channel and single SU channel group two types of SU connections are considered: fixed header with fixed payload and fixed header with exponentially distributed payload. The fixed header duration is denoted by 1/ , the fixed payload length denoted by 1/ , and the mean exponential payload length is denoted by 1/ . The Poisson arrival rate of a single SU group is denoted by . III. PERFORMANCE ANALYSIS CTMC is used the spectrum sharing scenario between the PU and SU groups. CTMC has been extensively used in conventional cellular systems to model the cell residence time1, call dropping probability and handover probability [5]. In these scenarios, the birth-death process (often referred to as a loss system) is one of the commonly used CTMC models. In a CTMC model, the number of connections from the user groups are represented by states (written as n tuples), such as (x1, x2), where x1 and x2 may represent the number of PU and SU connections. The transition of one state to another is based on the Markov property [6] which assumes memory less arrivals and departures. Under stationary assumptions, the rate of transition from and to a state is equal. This fundamental fact is used to calculate the state probabilities under the constraint that the sum of all state probabilities is equal to 1. A. Fixed Payload Length When the payload is fixed, the total connection length can be expressed by the sum of the overhead and payload length, i.e. [3] (1) When the fixed length SU connection on the channel, the system is not purely Markovian and also it cannot represent by a simple birth-death process. In this approach, the connection with fixed length is replaced by a continuous group of Y exponentially distributed connection which are independent and identically distributed (i.i.d.). The total length of this Y i.i.d. connection is Erlang distributed and individual connection has an average length of 1/ Y . It is well established that as Y , then the total length is the same as the fixed length connections 1/ . Science the fixed length connection is replaced by a group of Y i.i.d connection, a Y node CTMC is used the number of the arrivals of the connection in the group, and i.e. the yth node models the arrival of the connection in the group. These states are referred to as the phases of a fixed SU connection [6]. Complete CTMC model is shown in Fig.2, where the state is (i; j; y), where, i and k ( represents the presence (1) and absence (0) of a SU and PU connection on the channel, 1≤y≤Y represents the phases of a SU connection when i=1 shown in fig. The total mean departure rate from each phase of the SU connection is (Y ), where Y is the completion rate of each i.i.d connection and ), is the termination rate due to the arrival of a PU connection. A set of balance equations for the CTMC in figure is given as (a) (b) Fig. 2. CTMC model of SU connections with fixed payload ( + ) P(0,0,0)= P(0,1,0)+Y P(1,0,Y); Y P (1, 0, 1) = P (0, 0, 0); (Y + )P (1, 0, 2) =Y P (1, 0, 1); . . (2) . . . (Y + ) P (1, 0, Y) =Y P (1, 0, Y-1) Such that (3) Where, P (i; k; y) represents the probability of the state (i; k; y). By simple algebraic manipulation of equations in (2), the probability of the phase P (1; 0; y) in terms of P (0, 0, and 0) can be written as [3] (4) i, k, y Phase of SU connection when i=1 i=1 -- Active SU connection i=0 -- Inactive SU connection k=1 -- Active PU connection k=0 -- Inactive PU connection
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 www.ijarcet.org 1868 Using P (i; k; y), the expression for the force termination probability, blocking probability and throughput are derived. 1) Blocking probability: In Fig. 2(b), an incoming SU connection is blocked when the channel is occupied by a PU or SU connection. The blocking probability in this scenario can be expressed as [3] 1-P (0, 0, 0) (5) Since the arrival of a PU connection is in dependent of a SU connection, the Probability of a PU connection on the channel P (0, 1, and 0) can be written as (6) Using (2), (4) and (6), the blocking probability of a SU connection with Erlang-Y distributed connection length has the following mathematical expression (7) Let the blocking probability of SU connections with fixed payload length becomes (8) 2) Force termination probability: Forced termination probability is defined as the probability that an ongoing SU connection is terminated prematurely. Based on the fact that the sum of forced and unforced termination rates equals to the incoming connection rate, the forced termination probability can be written as [3] (9) Using (9), the forced termination probability of SU with Erlang-Y distributed connection length can be written as (10) Using (2) and (5), can be expressed as (11) Note that the geometric series in the above equation is convergent (common ratio ); hence (11) can be simplified to (12) Let be the force termination probability of SU connection with fixed payload. The can be written as (13) B. Exponential Payload Length In the following, the forced termination probability, blocking probability of the SU connection with a fixed header and exponentially distributed payload length are calculated. Fig. 3 CTMC model of SU connections with fixed header and exponentially distributed payload. Fig. 3 shows that the CTMC of the system. In this figure the states (1, 0, y), y= {1….Y} represent the phases of fixed header portion, whereas the state (1, 0, 0) represents the exponentially distributed payload portion. Similarly to the fixed header length 1/ is modeled as limiting case of Erlang-Y distribution, and exponentially distributed payload length is given by 1/ . The global balance equation of the above system is as follows [7] ( + ) P (0, 0, 0) = P (0, 1, 0) + . P (1, 0, 0), (Y + )P (1, 0, 1) = P (0, 0, 0), (Y + )P (1, 0, 2) =Y P (1, 0, 1), . . (14) . . . (Y + )P (1, 0, Y) =Y P (1, 0, Y-1), ( + .) P (1, 0, 0) = Y P (1, 0, Y), 1) Blocking probability: - Solving (14) for P (0; 0; 0) and using (5), the blocking probability of the SU connection can be written as (15)
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1869 www.ijarcet.org In the limit is the blocking probability of SU connections with exponentially distributed payload length. It can be shown that [7] (16) 2) Force termination Probability: The force termination probability can be calculated by using the definition in (9). In this scenario the force termination probability [7] (17) Using the balance equation (14) the can be expressed as (18) In the limit, let be the force termination probability of SU connection with exponentially payload length. (19) (20) Where and . IV. NUMERICAL RESULT In this section, we have shown some numerical examples of the forced termination probability and blocking probability with fixed and exponentially distributed payload length. The Fig. 4 shows the blocking probability for fixed payload length ( for different value of mean header duration (1/ . So it is clear from the figure when mean payload length increases (1/ , blocking probability decreases and also analyzed when mean header duration (1/ increases, blocking probability also increases. Fig. 4 Blocking probability for fixed payload against mean payload length for different mean header duration Fig. 5 Force termination probability for fixed payload against mean payload length for different mean header duration The Fig. 5 shows the force termination probability for fixed payload length ( for different value of mean header duration (1/ . So it is clear from the figure when mean payload length increases (1/ , force termination probability increases and also analyzed when mean header duration (1/ increases, force termination probability also increases.
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 www.ijarcet.org 1870 Fig. 6 Blocking probability ( for exponential distribution payload payload against mean payload length for different mean header duration The Fig. 6 shows the blocking probability for exponential distributed payload length ( for different value of mean header duration (1/ . So it is clear from the figure when mean payload length increases (1/ , blocking probability decreases and also analyzed when mean header duration (1/ increases, blocking probability also increases. Fig. 7 Force termination probability ( for exponential distribution against mean payload length for different mean header duration The Fig.7 shows the force termination probability for fixed payload length ( for different value of mean header duration (1/ . So it is clear from the figure when mean payload length increases (1/ , force termination probability increases and also analyzed when mean header duration (1/ increases, force termination probability also increases. The Fig.8 shows the blocking probability for fixed payload length ( against arrival rate of SU for different value of mean header duration (1/ . So it is clear from the figure when arrival rate of SU increases ( , blocking probability increases and also analyzed when mean header duration (1/ increases, blocking probability also decreases. Fig.9 shows the blocking probability for exponential distributed payload length against arrival rate of SU for different value of mean header duration. In this figure when arrival rate of SU increases, blocking probability increases, but when mean header length increases blocking probability also increases. Fig. 8 Blocking probability for fixed payload against arrival rate of SU for different mean header duration Fig. 9 Blocking probability for exponential distributed payload against arrival rate of SU for different mean header duration A. Comparison between fixed and exponential payload length
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1871 www.ijarcet.org Fig. 10 Comparison between Blocking probability for fixed ( and exponential payload ( length against mean payload (1/ ) In Fig. 10 shows the Comparison between Blocking probability for fixed ( and exponential payload ( length against mean payload (1/ ) for mean header duration ( =0.1. So it is clear from the figure blocking probability decreases when mean payload length increase and also observe the exponential distribution of blocking probability are lower than the fixed payload blocking probability. Fig. 11 Comparison between Force termination probability for fixed ( and exponential payload ( length against mean payload (1/ ) In Fig. 11 shows that the Comparison between Force termination probability for fixed ( and exponential payload ( length against mean payload (1/ ) for mean header duration ( =0.1. So it is clear from the figure force termination probability increases when mean payload length increase and also observe the exponential distribution of force termination probability are lower than the fixed payload force termination probability. In Fig. 12 shows that the Comparison between Blocking probability for fixed ( and exponential payload ( length against arrival rate of SU for mean header duration ( =0.1. So it is clear from the figure blocking probability increases when arrival rate of SU increase and also observe the exponential distribution of blocking probability are lower than the fixed payload blocking probability. Fig. 12 Comparison between Blocking probability for fixed ( and exponential payload ( length against arrival rate of SU V. CONCLUSION In this paper, we have used a continuous time markov chain model to calculate QoS parameter of the SU for fixed payload length and exponential distribution payload length with fixed header using a single channel of PU and SU. Numerical results are shown and compared with those of fixed header duration. Results show that the blocking probability and force termination probability is greater in fixed payload length rather than exponential distribution payload length. This work may further be extended for multiple PU channel and two SU groups with spectrum handoff and channel reservation in interweave access mode. REFERENCES [1] Sudhir Srinivasa and Syed Ali Jafar, “The Throughput Potential of Cognitive Radio: A Theoretical Perspective”, IEEE Communications Magazine, May 2007 pp.73-79. [2] Qing Zhao and Brian M. Sadler, “A Survey of Dynamic Spectrum Access”, IEEE Signal Processing Magazine, May 2007 pp.79-89 [3] W. Ahmed, J. Gao, H. Zhou and M. Faulkner, “Goodput and Channel allocation," in Proceedings Personal Indoor and Mobile Radio Communications (PIMRC), pp. 476-480, 13-16 Sept. 2009. [4] T. Weiss and F. Jondral, “Spectrum Pooling: An Innovative Strategy for the Enhancement of Spectrum Efficiency," IEEE Communication. Mag., vol. 42, pp. S8- S14, Mar. 2004. [5] D. Hong and S. Rappaport, “Traffic Model and Performance Analysis for Cellular Mobile Radio Telephone Systems with Prioritized and
  • 7. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 www.ijarcet.org 1872 Nonprioritized Handoff Procedures," IEEE Transactions. Vehicular. Technol., vol. 35, pp. 77-92, Aug. 1986. [6] J. Mehdi, Stochastic Models in Queuing Theory. Academic Press, San Diego: CA, 1991. [7] J. Gao, W. Ahmed, J. Yang, and M. Faulkner, “Throughput Comparison in Cognitive Radio Networks," in Proceedings of Electrical Engineering/Electronics Computer Telecommunications and Information Technology (ECTI-CON), pp. 748-751, 19-21 May 2010. Pinki Yadav was born in India on February 2, 1987. She received her B.E. degree in Electronics and Communication from Mandsaur institute of technology, Mandsaur (University RGPV Bhopal), M.P. India in 2010 and currently is a M. Tech (Signal Processing) student in Mody Institute of Technology and Science (Deemed University), Rajasthan, India. Dr. Partha Pratim Bhattacharya was born in India on January 3, 1971. He has 15 years of experience in teaching and research. He served many reputed educational Institutes in India in various positions starting from Lecturer to Professor and Principal. At present he is working as Professor in Department of Electronics and Communication Engineering in the Faculty of Engineering and Technology, Mody Institute of Technology and Science (Deemed University), Rajasthan, India. He worked on Microwave devices and systems and mobile cellular communication systems. He has published a good number of papers in refereed journals and conferences. His present research interest includes mobile communication and cognitive radio. Dr. Bhattacharya is a member of The Institution of Electronics and Telecommunication Engineers, India and The Institution of Engineers, India. He is the recipient of Young Scientist Award from International Union of Radio Science in 2005. He is working as the chief editor, editorial board member and reviewer in many reputed journals.