Loading...
Search for: cognition
0.007 seconds
Total 184 records

    Multi-user opportunistic spectrum access with channel impairments [electronic resource]

    , Article AEU - International Journal of Electronics and Communications ; Volume 67, Issue 11, November 2013, Pages 955–966 Majd, A. (Sayyed Arash) ; Salehkalybar, S ; Pakravan, M. R ; Sharif University of Technology
    Abstract
    In this paper, we study the impact of sensing error and channel fading on the decision process of a multiple secondary user network in a primary network whose channel occupancy states are modelled as a Bernoulli process. We present a randomized access strategy to maximize total secondary network throughput. The proposed method guarantees that the probability of collision between primary and secondary users in each channel is less than the predefined value of Pc = ξ. To find the optimal access strategy, we formulate secondary network throughput as an optimization problem. Then, using the KKT method to find the solution, we break the original problem into multiple sub-problems. Then, we employ... 

    Spectrally encoded code-division multiple access for cognitive radio networks

    , Article IET Communications ; Vol. 8, Issue. 2 , 2014 , Pages 184-196 ; ISSN: 17518628 Najafi, S ; Shayesteh, M. G ; Sharif University of Technology
    Abstract
    Recent studies have revealed that spectrum congestion is due to the inefficient usage of spectrum against the availability. Cognitive radio is viewed as an approach for improving the utilisation of radio spectrum. The spectrally encoded (spread-time) code-division multiple access (SE-CDMA) technique (which is regarded as the dual of spread spectrum CDMA) is considered and its performance in cognitive radio networks is studied. In cognitive network spectrum, overlay and underlay techniques are employed to enable the primary and secondary users to coexist while improving the overall spectrum efficiency. It is shown that SE-CDMA provides considerable flexibility to design overlay and underlay... 

    Opportunistic spectral access in cooperative cognitive radio networks

    , Article IEEE Vehicular Technology Conference ; 14-17 September , 2014 ; ISSN: 15502252 ; ISBN: 9781479944491 Liang, W ; Ng, S. X ; Bayat, S ; Li, Y ; Hanzo, L ; Sharif University of Technology
    Abstract
    A pragmatic distributed algorithm (PDA) is proposed for supporting the ef-cient spectral access of multiple Primary Users (PUs) and Cognitive Users (CUs) in cooperative Cognitive Radio (CR) networks. The CUs may serve as relay nodes for relaying the signal received from the PUs to their destinations, while both the PUs' and the CUs' minimum rate requirements are satis-ed. The key idea of our PDA is that the PUs negotiate with the CUs concerning the speci-c amount of relaying and transmission time, whilst reducing the required transmission power or increasing the transmission rate of the PU. Our results show that the cooperative spectral access based on our PDA reaches an equilibrium, when it... 

    Resource allocation using fragmented-spectrum synchronous OFDM-CDMA in cognitive radio networks

    , Article IWCIT 2014 - Iran Workshop on Communication and Information Theory ; May , 2014 ; ISBN: 9781479948772 Akhoondi, F ; Poursaeed, O ; Salehi, J. A ; Sharif University of Technology
    Abstract
    This paper presents a fragmented-spectrum synchronous OFDM-CDMA modulation and utilize it as secondary users modulation in a cognitive radio-based network to provide high data rate by efficiently exploiting available spectrum bands in a target spectral range while simultaneously offering multiple-access capability. In particular, given preexisting communications in the spectrum where the system is operating, a channel sensing and estimation method is used to obtain information of subcarrier availability. Given this information, some three-level codes are provided for emerging new cognitive radio users. Furthermore, analytical results of the system performance in a typical cognitive radio... 

    Multi-user opportunistic spectrum access with channel impairments

    , Article AEU - International Journal of Electronics and Communications ; Volume 67, Issue 11 , 2013 , Pages 955-966 ; 14348411 (ISSN) Majd, S. A ; Salehkaleybar, S ; Pakravan, M. R ; Sharif University of Technology
    2013
    Abstract
    In this paper, we study the impact of sensing error and channel fading on the decision process of a multiple secondary user network in a primary network whose channel occupancy states are modelled as a Bernoulli process. We present a randomized access strategy to maximize total secondary network throughput. The proposed method guarantees that the probability of collision between primary and secondary users in each channel is less than the predefined value of P c = ξ. To find the optimal access strategy, we formulate secondary network throughput as an optimization problem. Then, using the KKT method to find the solution, we break the original problem into multiple sub-problems. Then, we... 

    Nonlinear dynamical structure of sway path during standing in patients with multiple sclerosis and in healthy controls is affected by changes in sensory input and cognitive load

    , Article Neuroscience Letters ; Volume 553 , 2013 , Pages 126-131 ; 03043940 (ISSN) Negahban, H ; Sanjari, M. A ; Mofateh, R ; Parnianpour, M ; Sharif University of Technology
    2013
    Abstract
    Although several studies have applied traditional linear measures to evaluate postural control of patients with multiple sclerosis (MS), little is known about the nonlinear dynamics of this patient group. In this study, recurrence quantification analysis (RQA), a well documented nonlinear method, was used to compare the nonlinear dynamical structure of postural sway in two groups consisting of MS patients (. n=. 23) and healthy matched controls (. n=. 23). The study focuses on three levels of postural difficulty consisting of (1) standing on a rigid surface (force platform) with eyes open, (2) standing on a rigid surface with eyes closed, and (3) standing on a foam surface with eyes closed.... 

    Degrees of freedom in a three-user cognitive interference channel

    , Article 2013 Iran Workshop on Communication and Information Theory ; May , 2013 , Page(s): 1 - 6 ; 9781467350235 (ISBN) Shakeri, Z ; Chaghooshi, A. F ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    2013
    Abstract
    We study the degrees of freedom of the three-user Gaussian interference channel under the circumstance where one or more transmitters are non-causally cognitive, meaning they are aware of the messages of one or more transmitters in a non-causal manner. Our focus is on the total degrees of freedom of the three-user cognitive interference channel. Our first case is when only one of the transmitters is fully cognitive and knows the messages of the other users. We prove that using interference alignment and interference cancellation, the achievable total degrees of freedom is 11/6 and does not coincide with the calculated total degrees of freedom upper bound which is 2. In the second and third... 

    Delay analysis and buffer management for random access in cognitive radio networks

    , Article 2013 Iran Workshop on Communication and Information Theory ; May , 2013 , Page(s): 1 - 6 ; 9781467350235 (ISBN) Salehkaleybar, S ; Majd, S. A ; Pakravan, M. R ; Sharif University of Technology
    2013
    Abstract
    In this paper, we consider a cognitive radio network in which multiple Secondary Users (SUs) contend to access primary network's channels with a random access scheme. Our goal is to analyze SUs' queuing delay performance in terms of mean queue lengths and find a minimum buffer space for which the overflow probability is less than a desired threshold. In general, the considered network can be modeled as a multidimensional Markov chain. However, the enormous state space makes the numerical analysis intractable. Nevertheless, the state space can be reduced to a two-dimensional Markov chain in the symmetric channel condition. By this approach, the optimal contention probability that minimizes... 

    On degrees of freedom of the cognitive mimo two-interfering multiple-access channels

    , Article IEEE Transactions on Vehicular Technology ; Volume 62, Issue 5 , 2013 , Pages 2052-2068 ; 00189545 (ISSN) Ayoughi, S. A ; Nasiri Kenari, M ; Khalaj, B. H ; Sharif University of Technology
    2013
    Abstract
    This paper characterizes the exact spatial Degrees of Freedom (DoF) region of the two-user multiple-input-multiple-output two-interfering multiple-access channels (2-IMACs), which models the uplink transmission in cellular networks, for three scenarios. The first scenario is the 2-IMAC without cognition, for which the achievability is generalized for more than two transmitters in each multiple-access channel. The two-user 2-IMACs' DoF regions are also derived for two different genie-aided cognition scenarios. Here, zero forcing by transmitters and interference alignment are studied in a network with more than two transmitters, whereas previous works dealt with two-transmitter networks. We... 

    A new spectrum sensing method using output analysis of the PFD

    , Article IEEE Transactions on Circuits and Systems II: Express Briefs ; Volume 60, Issue 6 , 2013 , Pages 366-370 ; 15497747 (ISSN) Vahidpoor, Z ; Fotowat Ahmady, A ; Forooraghi, K ; Atlasbaf, Z ; Sharif University of Technology
    2013
    Abstract
    In this brief, a new blind spectrum sensing method is proposed based on frequency comparison using a phase frequency detector (PFD). The PFD output patterns are utilized in a way to sense the spectrum with no knowledge of incoming signals, noise, or channel parameters. The detection and false alarm error probabilities are analytically calculated for additive white Gaussian noise and sine-wave input and are simulated for different inputs. It is shown that the required detection and false alarm probabilities can be achieved by changing the system parameters. The results show that the proposed method has lower complexity and outperforms the previous single-antenna blind method over flat fading... 

    Distributed multiuser sequential channel sensing schemes in multichannel cognitive radio networks

    , Article IEEE Transactions on Wireless Communications ; Volume 12, Issue 5 , 2013 , Pages 2055-2067 ; 15361276 (ISSN) Shokri Ghadikolaei, H ; Sheikholeslami, F ; Nasiri Kenari, M ; Sharif University of Technology
    2013
    Abstract
    Effective spectrum sensing strategies enable cognitive radios (CRs) to identify and opportunistically transmit on under-utilized spectral resources. In this paper, sequential channel sensing problems for single and multiple secondary users (SUs) networks are effectively modeled through finite state Markovian processes. More specifically, a model for single user case is introduced and its performance is validated through analytical analysis. Then, in order to address multiple SUs case, this model is extended to include the modified p-persistent access (MPPA) protocol. Since the scheme utilized experiences a high level of collision among the SUs, to mitigate the problem appropriately,... 

    A new outer bound for a class of interference channels with a cognitive relay and a certain capacity result

    , Article IEEE Communications Letters ; Volume 17, Issue 2 , 2013 , Pages 241-244 ; 10897798 (ISSN) Charmchi, H ; Hodtani, G. A ; Nasiri Kenari, M ; Sharif University of Technology
    2013
    Abstract
    The interference channel with a cognitive relay is a variation of the classical two-user interference channel in which a relay aids the transmission among the users. The relay is assumed to have genie-aided cognition: that is it has full, a-priori, knowledge of the messages to be transmitted. We obtain a new outer bound for this channel model and prove capacity for a class of channels in which the transmissions of the two users are non interfering. This capacity result improves on a previous result for the Gaussian case in which the capacity was proved to within a gap of 3 bits/s/Hz  

    Properties of functional brain networks correlate frequency of psychogenic non-epileptic seizures

    , Article Frontiers in Human Neuroscience ; Issue DEC , 2012 ; 16625161 (ISSN) Barzegaran, E ; Joudaki, A ; Jalili, M ; Rossetti, A. O ; Frackowiak, R. S ; Knyazeva, M. G ; Sharif University of Technology
    Frontiers Media S. A  2012
    Abstract
    Abnormalities in the topology of brain networks may be an important feature and etiological factor for psychogenic non-epileptic seizures (PNES). To explore this possibility, we applied a graph theoretical approach to functional networks based on resting state EEGs from 13 PNES patients and 13 age- and gender-matched controls. The networks were extracted from Laplacian-transformed time-series by a cross-correlation method. PNES patients showed close to normal local and global connectivity and small-world structure, estimated with clustering coefficient, modularity, global efficiency, and small-worldness metrics, respectively. Yet the number of PNES attacks per month correlated with a... 

    Learning-based spectrum sensing time optimization in cognitive radio systems

    , Article 2012 6th International Symposium on Telecommunications, IST 2012, 6 November 2012 through 8 November 2012 ; November , 2012 , Pages 249-254 ; 9781467320733 (ISBN) Shokri Ghadikolaei, H ; Abdi, Y ; Nasiri-Kenari, M ; Sharif University of Technology
    2012
    Abstract
    Powerful spectrum sensing schemes enable cognitive radios (CRs) to find transmission opportunities in spectral resources allocated exclusively to primary users. In this paper, the problem of maximizing the average throughput of a cognitive radio system through optimizing its spectrum sensing time is investigated, and a systematic neural network-based optimization approach is proposed which avoids challenges associated with the conventional analytical solutions. The proposed method exploits a novel learning and optimization cycle to enable an effective cooperation between two kinds of well-known artificial neural networks and finds the optimum value of the channel sensing time without any... 

    Optimal and suboptimal sensing sequences in multiuser cognitive radio networks

    , Article 2012 6th International Symposium on Telecommunications, IST 2012, 6 November 2012 through 8 November 2012 ; November , 2012 , Pages 243-248 ; 9781467320733 (ISBN) Shokri Ghadikolaei, H ; Nasiri Kenari, M ; Sharif University of Technology
    2012
    Abstract
    Designing proper spectrum decision schemes for cognitive radios (CRs) improves spectral usage efficiency as well as CR network throughput. One of the key effecting factors of the CR network throughput is the spectrum sensing sequences of the secondary users (SUs). In this paper, the SUs throughput maximization through appropriately selecting the sensing sequences of the SUs, called sensing matrix (SM), is investigated. More specifically, first the average throughput of the CR network is evaluated for a given SM in the case of error-free channel sensing. Then, an optimization problem is formulated with the aim to maximize the network throughput by finding the optimal SM. In order to avoid... 

    Saturation throughput analysis of a cognitive IEEE 802.11-based WLAN overlaid on an IEEE 802.16e WiMAX

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 9 September 2012 through 12 September 2012 ; September , 2012 , Pages 1515-1520 ; 9781467325691 (ISBN) Rahimzadeh, P ; Moradian, M ; Ashtiani, F ; Sharif University of Technology
    2012
    Abstract
    In this paper, we focus on a cognitive network scenario, comprised of a WLAN overlaid on a network with time-scheduled primary users. WiMAX is an example of such primary networks. For time-scheduled primary users simple On-Off traffic model with exponential durations is not valid anymore. In this scenario, the cognitive nodes (CNs) hear downlink map (DL-MAP) and thus, know the frequency and time locations of all allocated slots at each frame. Then, cognitive nodes contend with each other in order to transmit their fixed size packets based on IEEE 802.11 MAC protocol. Since the number of empty slots at each frame is variable each packet transmission in cognitive network prolongs a random... 

    A game-theoretic approach for joint channel and power allocation in downlink of cellular cognitive radio networks

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC ; 2012 , Pages 1198-1202 ; 9781467325691 (ISBN) Omidvar, N ; Khalaj, B. H ; Sharif University of Technology
    2012
    Abstract
    In this paper, we consider a cellular cognitive radio network that uses opportunistic spectrum access for its transmission in the downlink direction from base stations toward cognitive radio users. Since the spectrum is licensed to a primary network, proper resource management should be employed in the secondary network to protect primary users against excessive interference while providing acceptable utilization for secondary users. We use game theory to propose a distributed method for joint frequency and power allocation in the downlink of cognitive radio networks. Earlier works in this area were based on centralized optimization-based approaches, whereas our proposed method solves the... 

    Analyzing factors effective on the development of relationship commitment

    , Article Proceedings of the 2012 International Conference on Artificial Intelligence, ICAI 2012, 16 July 2012 through 19 July 2012 ; Volume 1 , July , 2012 , Pages 398-404 ; 1601322186 (ISBN) ; 9781601322180 (ISBN) Dehdashti, Y ; Lotfi, N ; Karami, N ; Sharif University of Technology
    2012
    Abstract
    Due to the important role of commitment and trust in the relationship marketing, the factors which can directly result in a committed relationship along with the factors which can influence the commitment through influencing trust, according to the model of commitment and trust by (Morgan & Hunt, 1994) have been introduced and their level of importance has been investigated here. The article uses fuzzy cognitive maps (FCMs) in the proposed model to find the most important paths leading to relationship commitment. The FCM analyzes the responses of a group of 30 people including general practitioners in dentistry, managers of dental departments in some of the public clinics and hospitals who... 

    Impact of cognition and cooperation on MAC layer performance metrics, part i: Maximum stable throughput

    , Article IEEE Transactions on Wireless Communications ; Volume 11, Issue 12 , 2012 , Pages 4252-4263 ; 15361276 (ISSN) Sharifi, A. A ; Ashtiani, F ; Keshavarz, H ; Nasiri Kenari, M ; Sharif University of Technology
    2012
    Abstract
    In this paper, we consider a broadband secondary transmitter-receiver pair which interferes with N narrowband primary users and study the effect of cognition and cooperation on the maximum stable throughput. In our study we focus on four transmission protocols as well as two channel types, i.e., flat fading and frequency selective fading. In the cooperative protocols, the broadband transmitter relays the packets of the primary users which have not correctly decoded at the primary receiver. The analysis includes random packet arrivals at the transmitters which may impact on the maximum stable throughput. Moreover, sensing errors at the secondary user are considered. In this paper, we derive... 

    Three-user cognitive interference channel: Capacity region with strong interference

    , Article IET Communications ; Volume 6, Issue 13 , 2012 , Pages 2099-2107 ; 17518628 (ISSN) Mirmohseni, M ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
    IET  2012
    Abstract
    This study investigates the capacity region of a three-user cognitive radio network with two primary users and one cognitive user. A three-user cognitive interference channel (C-IFC) is proposed by considering a three-user interference channel (IFC) where one of the transmitters has cognitive capabilities and knows the messages of the other two transmitters in a non-causal manner. First, two inner bounds on the capacity region of the three-user C-IFC are obtained based on using the schemes which allow all receivers to decode all messages with two different orders. Next, two sets of conditions are derived, under which the capacity region of the proposed model coincides with the capacity...