SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Rita Mahajan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.51-55
www.ijera.com 51 | P a g e
Technique for Predicting Data Rate for Cognitive Radio Using
Neural Network
Rita Mahajan1
, Dr. Deepak Bagai2
1
Assistant Professor, 2
Associate Professor E&EC Dept., PEC University of Technology, Chandigarh, India
Abstract
Significant problems confronting wireless communications, are scarcity and deployment difficulty. The
deployment problem is a process problem i.e., frequency allocation is fixed and is done so by complex
collaboration and coordination between countries and systems, respectively. The limited available spectrum and
the inefficiency in the spectrum usage necessitate a new communication paradigm to exploit the existing
wireless spectrum opportunistically called cognitive radio technology. In this paper we have proposed a
learning technique using neural network to be used in cognitive radio so that it can predict the data rate.
Performance of learning scheme has been observed using Matlab simulations and found that Focused Time
Delay Neural Networks are good candidate for cognitive radios.
Keywords — cognitive radio, neural network, dynamic spectrum access, wireless communication.
I. INTRODUCTION
The requirement for higher data rates is
increasing as a result of the transition from voice-
only communications to multimedia type
applications. Given the limitations of the natural
frequency spectrum, it becomes obvious that the
current static frequency allocation schemes cannot
accommodate the requirements of an increasing
number of higher data rate devices. As a result,
innovative techniques that can offer new ways of
exploiting the available spectrum are needed.
Cognitive radio arises to be a tempting solution to the
spectral congestion problem[1].
Fortunately, recent research efforts to
characterize actual spectrum usage in both urban and
rural areas have shown that more spectrum is
available than conventionally realized[2]. Defense
Advanced Research Projects Agency (DARPA)
asserts that the upper bound of usage is only 6% as
shown in the sanitized power spectrum distribution
(PSD) of Fig. 1. We would find that:
1) Some frequency bands in the spectrum are largely
unoccupied most of the time.
2) Some other frequency bands are only partially
occupied.
3) The remaining frequency bands are heavily used.
The underutilization of electromagnetic spectrum
leads us to think in terms of spectrum holes, for
which we offer the following definition:
―A spectrum hole is a band of frequencies
assigned to a primary user, but, at a particular time
and specific geographic location, the band is not
being utilized by that user‖.
Fig. 1. View of the actual availability of spectrum.
The inefficiency in the spectrum usage
necessitates a new communication paradigm to
exploit the existing wireless spectrum
opportunistically. Dynamic spectrum access is
proposed to solve these current spectrum inefficiency
problems. DARPA‘s approach on Dynamic Spectrum
Access networks, aims to implement the policy based
intelligent radios known as cognitive radios[2].
II. COGNITIVE RADIO
The term cognitive radio identifies the point
at which wireless personal digital assistants (PDAs)
and the related networks are sufficiently
computationally intelligent about radio resources and
related computer-to-computer communications to
detect user communications needs as a function of
use context and to provide radio resources and
wireless services most appropriate to those needs.
RESEARCH ARTICLE OPEN ACCESS
Rita Mahajan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.51-55
www.ijera.com 52 | P a g e
A cognitive radio adds both a sensing and
an adaptation element to the wireless network [3].
Four new capabilities embodied in cognitive radios
will help enable dynamic use of the spectrum:
flexibility, agility, RF sensing, and networking [2-3].
● Flexibility is the ability to change the waveform
and the configuration of a device.
● Agility is the ability to change the spectral band
in which a device will operate.
● Sensing is the ability to observe the state of the
system, which includes the radio and, more
importantly, the environment. It is the next
logical component in enabling dynamics.
● Networking is the ability to communicate
between multiple nodes and thus facilitate
combining the sensing and control capacity of
those nodes.
Fig. 2: Representation of cognitive radio cycle
In this respect, future cognitive radio
devices will have the capability, to choose on the fly
the radio configuration, by taking into account the
context of operation (device status and environment
aspects), goals, policies, profiles and capabilities, and
machine learning (for representing and managing
knowledge and experience). Simplified cognitive
radio cycle is shown in Fig. 2. During sensing
various environmental conditions are probed and
these are used to estimate and predict the
performance of various configurations[7]. In the final
phase the best configuration is selected.
III. RELATED WORK
The problem of spectrum occupancy status
from the perspective of binary time series for CR is
considered in paper[4]. Time series models derived
are tested in terms of raw residuals. Two types of
spectrum occupancy schemes, namely deterministic
and non–deterministic schemes, are considered. The
performance of the predictor suffered in case of the
non-deterministic nature of the binary series. Hidden
Markov Models (HMMs) to model and predict the
spectrum occupancy of licensed radio bands is used
in paper[5]. The proposed technique can dynamically
select different licensed bands for its own use with
significantly less interference from and to the
licensed users. But the accuracy of the prediction
was not provided. Another HMM based predictor
was also proposed in [6], but it only deals with
deterministic traffic scenarios, but it is not applicable
for the actual environment. HMM based spectrum
and data rate prediction schemes has some drawbacks
such as determining an optimal model is difficult, a
large memory space is required to store the past
observations and high computational complexity is
required for estimation of model[7]. The neural
network predictor is trained only once in an offline
fashion when the observed process is stationary.
Once the neural networks are trained, the
computational complexity is significantly reduced[8-
9].
IV. REVIEW OF ARTIFICIAL
NEURAL NETWORKS
The first artificial neural was presented by
the neurophysiologist W. McCulloch and the logician
W. Pits in 1943 for the study of the human brain[5].
The idea of artificial neural network (ANN) was then
applied to computational models. Modeled on a
nerve plexus, an ANN is nothing more than a set of
nonlinear functions with adjustable parameters to
give a desired output. A neural network consists of a
pool of simple processing units, the ‗neurons‘.
Within NNs three types of neurons are distinguished:
input neurons which receive data from outside the
NN and are organized in the so called input layer,
output neurons which send data out of the NN and
generally comprise the output layer, and hidden
neurons whose input and output signals remain
within the NN and form the so called hidden layer (or
layers) as shown in Fig. 3.
Fig. 3: Artificial Neural Network
The steps for computing the output of a
single neuron are as follows:
(1) Compute the weighted sum of inputs to the
neuron.
(2) Add the bias to the sum.
Rita Mahajan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.51-55
www.ijera.com 53 | P a g e
(3) Feed the sum as an input to the activation
function of the neuron.
The output of the activation function is
defined to be the output of the neuron. These steps
can be summarized in the following formula: Output
= A(∑wk*Ik + bias) where A is the activation
function of the neuron, wk is the weight of the kth
in-
edge, Ik is the input carried across the kth
in-edge, and
bias is the bias of the neuron. This can be represented
by the Fig. 4.
Fig. 4: Single Neuron as Processing Unit
Some type of activation functions can be
used for that reason, such as a linear function, or a
smoothly limiting function often being a sigmoid (S-
shaped) function like the logistic- sigmoid transfer
function, or hyperbolic tangent sigmoid transfer
function or step function based on the algorithm to be
used as shown in Fig 5.
Fig. 5: Activation Functions
The advantage of neural networks over
statistical models is that it does not require a priori
knowledge of the underlying distributions of the
observed process. Therefore, the neural networks
offer an attractive choice for modeling the predictor.
It is apparent that the NN derives its
computing power through, first, its massive parallel
distributed structure and, second, its ability to learn
and therefore to generalize. The remarkable works on
the study of neural networks can be contributed to
several researchers. Rumelhart proposed the Error
Back-Propagation Neural Network (BPNN, 1986)
which is effective to solve many application
problems. Hopfield proposed the Hopfield Neural
Network based on the research of Ising model in
1984. Hardy, Harder and Desmarais proposed the
Radial Basis Function Neural Network (RBFNN).
V. SIMULATION AND RESULTS
The focus is on to predict the achievable
transmission data rate from a set of reference values
that uniquely characterize each of the operating
standard modes, e.g. according to IEEE 802.11g
specifications, the achievable raw data rates are in the
set R1={6, 12, 24, 36, 48, 54} in Mbps. It has been
assumed that the proposed neural network has been
tunned to WLAN using IEEE 802.11g. The
probabilistic data has been generated using lowest
probability to the highest data rate and highest
probability to the lowest data rate. This is due to the
fact that probability of occurrence of spectrum hole
at lower data rate is more. The probability
distribution used for data rates {6, 12, 24, 36, 48, 54}
in Mbps is {.5 .2 .1 .1 .06 .04} respectively. The
simulations have been done in Matlab. The size of
randomly generated time series data set is 2000 for
training.
The neural network that has been selected is
Focused Time-Delay Neural Network (FTDNN)
which is a feed-forward input-delay back-
propagation network, and consists of a feedforward
network with a tapped delay line in the input and is
shown in Fig. 6. The duration of each slot in the
tapped delay line is set equal to the predefined time
intervals used for monitoring reasons, and with
default value set equal to one timestep. Parameters
used for simulations are given in Table 1.
Fig. 6: Focused Time Delay Neural Network
TABLE 1: PARAMETERS FOR NEURAL
NETWORK
Net Type FTDNN
Training data set size 2000
No. of hidden neurons 20
Delay elements 5
Training function Trainlm
Epochs 100
Learning rate .001
Rita Mahajan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.51-55
www.ijera.com 54 | P a g e
Fig. 7: Response of output element of FTDNN
Fig. 8: Gradient and Validation Check
Fig 9: Performance of network in terms of MSE
It has been observed from Fig. 7 that during
that when data set for testing is applied which is 10%
of total data set, the error in prediction is around 5%.
Fig.8 shows when validation data set is applied,
almost no validation fail for 39 epoches. The
performance matrices (Mean Square Error) MSE is
less than 10-6
in 39th
epoch as shown in Fig. 9.
VI. CONCLUSIONS
This paper introduces and evaluates learning
schemes that are based on artificial neural networks
and can be used for discovering the performance (e.g.
data rate) that can be achieved by a specific radio
configuration in a cognitive radio system. So
predicted data rate can be used to decide the next
radio configuration. In order to design and use an
appropriate neural network structure, performance
analysis has been done in simulation environment.
The results have been presented and discussed in
order to show the benefits of incorporating neural
network based learning schemes into cognitive radio
systems.
REFERENCES
[1] J. Mitola, ―Cognitive Radio: An
Integrated Agent Architecture for Software
Defined Radio‖, Ph.D. thesis, Royal
Institute of Technology, 2000.
[2] Simon Haykin, ―Cognitive Radio:
Brain-Empowered wireless
communications‖, IEEE Journal on
Selected Areas in Communications, Vol. 23,
No. 2, pp 201-220, February 2005.
Rita Mahajan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.51-55
www.ijera.com 55 | P a g e
[3] Cristian Ianculescu, Andy Mudra,
―Cognitive radio and dynamic spectrum
sharing‖ Proceeding of the SDR 05
Technical Conference and Product
Exposition, pp 1-5, 2005.
[4] Baldo N, Zorzi M. ―Learning and adaptation
in cognitive radios using neural networks‖,
1st
IEEE workshop on cognitive radio
networks (in conjunction with IEEE CCNC
2008), 12 Jan., 2008, Las Vegas, Nevada,
USA.
[5] Tsagkaris K, Katidiotis A, Demestichas P.
―Neural network-based learning schemes for
cognitive radio systems‖, Computer
Communications, 2008;31(14):3394–3404.
[6] An He, Kyung Kyoon Bae, Timothy R.
Newman, Joseph Gaeddert, Kyouwoong
Kim, Rekha Menon, Lizdabel Morales-
Tirado, James Jody Neel, Youping
Zhao,Jeffrey H. Reed, and William H.
Tranter, ―A Survey of Artificial Intelligence
for Cognitive Radios‖ IEEE Transactions on
Vehicular Technology, VOL. 59, NO. 4,
MAY 2010, pp 1578-1592.
[7] Xuezhi Tan, Haoqin Huang, Lin Ma, ―
Frequency Allocation with Artificial Neural
Networks in Cognitive Radio System‖,
IEEE Tencon 2013, pp 366-370
[8] Hossein Shokri-Ghadikolaei, Younes Abdi,
Masoumeh Nasiri-Kenari, ―Analytical and
learning-based spectrum sensing time
optimisation in cognitive radio systems‖,
IET Communications, Vol. 7, Issue 5, 2013,
pp. 480–489.
[9] Y. Tawk, J. Costantine, E. Al-Zuraiqi, and
C. G. Christodoulou, ―Cognitive Radio
Antennas that Learn and Adapt Using
Neural Networks‖, Radio Science Meeting
(USNC-URSI NRSM), US National
Committee of URSI National, 9-12 Jan,
2013.
[10] Tumuluru V.K. , Ping Wang and Niyato
D. ,―A Neural Network Based Spectrum
Prediction Scheme for Cognitive Radio‖,
IEEE International Conference on
Communications (ICC), 2010, pp 1 - 5

Mais conteúdo relacionado

Mais procurados

SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKijngnjournal
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...IJMIT JOURNAL
 
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKSANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKSIJEEE
 
Efficient Clustering scheme in Cognitive Radio Wireless sensor network
Efficient Clustering scheme in Cognitive Radio Wireless sensor networkEfficient Clustering scheme in Cognitive Radio Wireless sensor network
Efficient Clustering scheme in Cognitive Radio Wireless sensor networkaziznitham
 
Online opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learningOnline opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learningHarshal Solao
 
Comparative study between metaheuristic algorithms for internet of things wir...
Comparative study between metaheuristic algorithms for internet of things wir...Comparative study between metaheuristic algorithms for internet of things wir...
Comparative study between metaheuristic algorithms for internet of things wir...IJECEIAES
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
 
AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...
AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...
AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...csandit
 
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachEnergy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachIJRES Journal
 
Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013ijcsbi
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksijassn
 

Mais procurados (17)

Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
 
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKSANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
 
Efficient Clustering scheme in Cognitive Radio Wireless sensor network
Efficient Clustering scheme in Cognitive Radio Wireless sensor networkEfficient Clustering scheme in Cognitive Radio Wireless sensor network
Efficient Clustering scheme in Cognitive Radio Wireless sensor network
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
Online opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learningOnline opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learning
 
Localization
LocalizationLocalization
Localization
 
Comparative study between metaheuristic algorithms for internet of things wir...
Comparative study between metaheuristic algorithms for internet of things wir...Comparative study between metaheuristic algorithms for internet of things wir...
Comparative study between metaheuristic algorithms for internet of things wir...
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
 
AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...
AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...
AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...
 
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachEnergy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
 
Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Eh33798804
Eh33798804Eh33798804
Eh33798804
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networks
 

Destaque

穴道按摩 不花錢的養生
穴道按摩 不花錢的養生穴道按摩 不花錢的養生
穴道按摩 不花錢的養生Jaing Lai
 
Ata 2014 02 04
Ata 2014 02 04Ata 2014 02 04
Ata 2014 02 04macoesapo
 
Independencia de chile 2
Independencia de chile 2Independencia de chile 2
Independencia de chile 2Alejandro Peña
 
Manual de redação do Distrito 13
Manual de redação do Distrito 13Manual de redação do Distrito 13
Manual de redação do Distrito 13guilhermeguerraoc
 
Care and Feeding of Your Non-Profit Web Presence
Care and Feeding of Your Non-Profit Web PresenceCare and Feeding of Your Non-Profit Web Presence
Care and Feeding of Your Non-Profit Web PresenceMade Better Studio
 
Portafolioelectrnico4697926004 1207616238353934-8[1]
Portafolioelectrnico4697926004 1207616238353934-8[1]Portafolioelectrnico4697926004 1207616238353934-8[1]
Portafolioelectrnico4697926004 1207616238353934-8[1]Avila Claudia
 
德川家康的二條城!
德川家康的二條城!德川家康的二條城!
德川家康的二條城!Jaing Lai
 

Destaque (10)

Mi camara y yo en el lanzamiento de peso
Mi camara y yo en el lanzamiento de pesoMi camara y yo en el lanzamiento de peso
Mi camara y yo en el lanzamiento de peso
 
穴道按摩 不花錢的養生
穴道按摩 不花錢的養生穴道按摩 不花錢的養生
穴道按摩 不花錢的養生
 
Ata 2014 02 04
Ata 2014 02 04Ata 2014 02 04
Ata 2014 02 04
 
Como no Creer
Como no CreerComo no Creer
Como no Creer
 
Independencia de chile 2
Independencia de chile 2Independencia de chile 2
Independencia de chile 2
 
Manual de redação do Distrito 13
Manual de redação do Distrito 13Manual de redação do Distrito 13
Manual de redação do Distrito 13
 
Totalitarismos
TotalitarismosTotalitarismos
Totalitarismos
 
Care and Feeding of Your Non-Profit Web Presence
Care and Feeding of Your Non-Profit Web PresenceCare and Feeding of Your Non-Profit Web Presence
Care and Feeding of Your Non-Profit Web Presence
 
Portafolioelectrnico4697926004 1207616238353934-8[1]
Portafolioelectrnico4697926004 1207616238353934-8[1]Portafolioelectrnico4697926004 1207616238353934-8[1]
Portafolioelectrnico4697926004 1207616238353934-8[1]
 
德川家康的二條城!
德川家康的二條城!德川家康的二條城!
德川家康的二條城!
 

Semelhante a I045075155

Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensorIJCNCJournal
 
Enhanced signal detection slgorithm using trained neural network for cognitiv...
Enhanced signal detection slgorithm using trained neural network for cognitiv...Enhanced signal detection slgorithm using trained neural network for cognitiv...
Enhanced signal detection slgorithm using trained neural network for cognitiv...IJECEIAES
 
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...IJCNCJournal
 
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...IJCNCJournal
 
A review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksA review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksAlexander Decker
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...IJERA Editor
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
 
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...ijeei-iaes
 
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKJournal For Research
 
Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...IJECEIAES
 
Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio IJECEIAES
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...IJMIT JOURNAL
 
Simulation and analysis of cognitive radio
Simulation and analysis of cognitive radioSimulation and analysis of cognitive radio
Simulation and analysis of cognitive radioijngnjournal
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
 
Signal Classification and Identification for Cognitive Radio: A Review
Signal Classification and Identification for Cognitive Radio: A ReviewSignal Classification and Identification for Cognitive Radio: A Review
Signal Classification and Identification for Cognitive Radio: A ReviewIRJET Journal
 
A Survey on Applications of Neural Networks and Genetic Algorithms in Fault D...
A Survey on Applications of Neural Networks and Genetic Algorithms in Fault D...A Survey on Applications of Neural Networks and Genetic Algorithms in Fault D...
A Survey on Applications of Neural Networks and Genetic Algorithms in Fault D...IOSR Journals
 
A Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A StudyA Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A Studyjosephjonse
 
A cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a studyA cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a studyijngnjournal
 
Neural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionNeural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionIJERA Editor
 

Semelhante a I045075155 (20)

Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensor
 
Enhanced signal detection slgorithm using trained neural network for cognitiv...
Enhanced signal detection slgorithm using trained neural network for cognitiv...Enhanced signal detection slgorithm using trained neural network for cognitiv...
Enhanced signal detection slgorithm using trained neural network for cognitiv...
 
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
 
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
 
A review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksA review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networks
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
 
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...
 
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
 
Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...
 
Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 
Simulation and analysis of cognitive radio
Simulation and analysis of cognitive radioSimulation and analysis of cognitive radio
Simulation and analysis of cognitive radio
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
 
Signal Classification and Identification for Cognitive Radio: A Review
Signal Classification and Identification for Cognitive Radio: A ReviewSignal Classification and Identification for Cognitive Radio: A Review
Signal Classification and Identification for Cognitive Radio: A Review
 
A Survey on Applications of Neural Networks and Genetic Algorithms in Fault D...
A Survey on Applications of Neural Networks and Genetic Algorithms in Fault D...A Survey on Applications of Neural Networks and Genetic Algorithms in Fault D...
A Survey on Applications of Neural Networks and Genetic Algorithms in Fault D...
 
Dy4301752755
Dy4301752755Dy4301752755
Dy4301752755
 
A Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A StudyA Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A Study
 
A cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a studyA cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a study
 
Neural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionNeural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal Recognition
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

I045075155

  • 1. Rita Mahajan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.51-55 www.ijera.com 51 | P a g e Technique for Predicting Data Rate for Cognitive Radio Using Neural Network Rita Mahajan1 , Dr. Deepak Bagai2 1 Assistant Professor, 2 Associate Professor E&EC Dept., PEC University of Technology, Chandigarh, India Abstract Significant problems confronting wireless communications, are scarcity and deployment difficulty. The deployment problem is a process problem i.e., frequency allocation is fixed and is done so by complex collaboration and coordination between countries and systems, respectively. The limited available spectrum and the inefficiency in the spectrum usage necessitate a new communication paradigm to exploit the existing wireless spectrum opportunistically called cognitive radio technology. In this paper we have proposed a learning technique using neural network to be used in cognitive radio so that it can predict the data rate. Performance of learning scheme has been observed using Matlab simulations and found that Focused Time Delay Neural Networks are good candidate for cognitive radios. Keywords — cognitive radio, neural network, dynamic spectrum access, wireless communication. I. INTRODUCTION The requirement for higher data rates is increasing as a result of the transition from voice- only communications to multimedia type applications. Given the limitations of the natural frequency spectrum, it becomes obvious that the current static frequency allocation schemes cannot accommodate the requirements of an increasing number of higher data rate devices. As a result, innovative techniques that can offer new ways of exploiting the available spectrum are needed. Cognitive radio arises to be a tempting solution to the spectral congestion problem[1]. Fortunately, recent research efforts to characterize actual spectrum usage in both urban and rural areas have shown that more spectrum is available than conventionally realized[2]. Defense Advanced Research Projects Agency (DARPA) asserts that the upper bound of usage is only 6% as shown in the sanitized power spectrum distribution (PSD) of Fig. 1. We would find that: 1) Some frequency bands in the spectrum are largely unoccupied most of the time. 2) Some other frequency bands are only partially occupied. 3) The remaining frequency bands are heavily used. The underutilization of electromagnetic spectrum leads us to think in terms of spectrum holes, for which we offer the following definition: ―A spectrum hole is a band of frequencies assigned to a primary user, but, at a particular time and specific geographic location, the band is not being utilized by that user‖. Fig. 1. View of the actual availability of spectrum. The inefficiency in the spectrum usage necessitates a new communication paradigm to exploit the existing wireless spectrum opportunistically. Dynamic spectrum access is proposed to solve these current spectrum inefficiency problems. DARPA‘s approach on Dynamic Spectrum Access networks, aims to implement the policy based intelligent radios known as cognitive radios[2]. II. COGNITIVE RADIO The term cognitive radio identifies the point at which wireless personal digital assistants (PDAs) and the related networks are sufficiently computationally intelligent about radio resources and related computer-to-computer communications to detect user communications needs as a function of use context and to provide radio resources and wireless services most appropriate to those needs. RESEARCH ARTICLE OPEN ACCESS
  • 2. Rita Mahajan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.51-55 www.ijera.com 52 | P a g e A cognitive radio adds both a sensing and an adaptation element to the wireless network [3]. Four new capabilities embodied in cognitive radios will help enable dynamic use of the spectrum: flexibility, agility, RF sensing, and networking [2-3]. ● Flexibility is the ability to change the waveform and the configuration of a device. ● Agility is the ability to change the spectral band in which a device will operate. ● Sensing is the ability to observe the state of the system, which includes the radio and, more importantly, the environment. It is the next logical component in enabling dynamics. ● Networking is the ability to communicate between multiple nodes and thus facilitate combining the sensing and control capacity of those nodes. Fig. 2: Representation of cognitive radio cycle In this respect, future cognitive radio devices will have the capability, to choose on the fly the radio configuration, by taking into account the context of operation (device status and environment aspects), goals, policies, profiles and capabilities, and machine learning (for representing and managing knowledge and experience). Simplified cognitive radio cycle is shown in Fig. 2. During sensing various environmental conditions are probed and these are used to estimate and predict the performance of various configurations[7]. In the final phase the best configuration is selected. III. RELATED WORK The problem of spectrum occupancy status from the perspective of binary time series for CR is considered in paper[4]. Time series models derived are tested in terms of raw residuals. Two types of spectrum occupancy schemes, namely deterministic and non–deterministic schemes, are considered. The performance of the predictor suffered in case of the non-deterministic nature of the binary series. Hidden Markov Models (HMMs) to model and predict the spectrum occupancy of licensed radio bands is used in paper[5]. The proposed technique can dynamically select different licensed bands for its own use with significantly less interference from and to the licensed users. But the accuracy of the prediction was not provided. Another HMM based predictor was also proposed in [6], but it only deals with deterministic traffic scenarios, but it is not applicable for the actual environment. HMM based spectrum and data rate prediction schemes has some drawbacks such as determining an optimal model is difficult, a large memory space is required to store the past observations and high computational complexity is required for estimation of model[7]. The neural network predictor is trained only once in an offline fashion when the observed process is stationary. Once the neural networks are trained, the computational complexity is significantly reduced[8- 9]. IV. REVIEW OF ARTIFICIAL NEURAL NETWORKS The first artificial neural was presented by the neurophysiologist W. McCulloch and the logician W. Pits in 1943 for the study of the human brain[5]. The idea of artificial neural network (ANN) was then applied to computational models. Modeled on a nerve plexus, an ANN is nothing more than a set of nonlinear functions with adjustable parameters to give a desired output. A neural network consists of a pool of simple processing units, the ‗neurons‘. Within NNs three types of neurons are distinguished: input neurons which receive data from outside the NN and are organized in the so called input layer, output neurons which send data out of the NN and generally comprise the output layer, and hidden neurons whose input and output signals remain within the NN and form the so called hidden layer (or layers) as shown in Fig. 3. Fig. 3: Artificial Neural Network The steps for computing the output of a single neuron are as follows: (1) Compute the weighted sum of inputs to the neuron. (2) Add the bias to the sum.
  • 3. Rita Mahajan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.51-55 www.ijera.com 53 | P a g e (3) Feed the sum as an input to the activation function of the neuron. The output of the activation function is defined to be the output of the neuron. These steps can be summarized in the following formula: Output = A(∑wk*Ik + bias) where A is the activation function of the neuron, wk is the weight of the kth in- edge, Ik is the input carried across the kth in-edge, and bias is the bias of the neuron. This can be represented by the Fig. 4. Fig. 4: Single Neuron as Processing Unit Some type of activation functions can be used for that reason, such as a linear function, or a smoothly limiting function often being a sigmoid (S- shaped) function like the logistic- sigmoid transfer function, or hyperbolic tangent sigmoid transfer function or step function based on the algorithm to be used as shown in Fig 5. Fig. 5: Activation Functions The advantage of neural networks over statistical models is that it does not require a priori knowledge of the underlying distributions of the observed process. Therefore, the neural networks offer an attractive choice for modeling the predictor. It is apparent that the NN derives its computing power through, first, its massive parallel distributed structure and, second, its ability to learn and therefore to generalize. The remarkable works on the study of neural networks can be contributed to several researchers. Rumelhart proposed the Error Back-Propagation Neural Network (BPNN, 1986) which is effective to solve many application problems. Hopfield proposed the Hopfield Neural Network based on the research of Ising model in 1984. Hardy, Harder and Desmarais proposed the Radial Basis Function Neural Network (RBFNN). V. SIMULATION AND RESULTS The focus is on to predict the achievable transmission data rate from a set of reference values that uniquely characterize each of the operating standard modes, e.g. according to IEEE 802.11g specifications, the achievable raw data rates are in the set R1={6, 12, 24, 36, 48, 54} in Mbps. It has been assumed that the proposed neural network has been tunned to WLAN using IEEE 802.11g. The probabilistic data has been generated using lowest probability to the highest data rate and highest probability to the lowest data rate. This is due to the fact that probability of occurrence of spectrum hole at lower data rate is more. The probability distribution used for data rates {6, 12, 24, 36, 48, 54} in Mbps is {.5 .2 .1 .1 .06 .04} respectively. The simulations have been done in Matlab. The size of randomly generated time series data set is 2000 for training. The neural network that has been selected is Focused Time-Delay Neural Network (FTDNN) which is a feed-forward input-delay back- propagation network, and consists of a feedforward network with a tapped delay line in the input and is shown in Fig. 6. The duration of each slot in the tapped delay line is set equal to the predefined time intervals used for monitoring reasons, and with default value set equal to one timestep. Parameters used for simulations are given in Table 1. Fig. 6: Focused Time Delay Neural Network TABLE 1: PARAMETERS FOR NEURAL NETWORK Net Type FTDNN Training data set size 2000 No. of hidden neurons 20 Delay elements 5 Training function Trainlm Epochs 100 Learning rate .001
  • 4. Rita Mahajan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.51-55 www.ijera.com 54 | P a g e Fig. 7: Response of output element of FTDNN Fig. 8: Gradient and Validation Check Fig 9: Performance of network in terms of MSE It has been observed from Fig. 7 that during that when data set for testing is applied which is 10% of total data set, the error in prediction is around 5%. Fig.8 shows when validation data set is applied, almost no validation fail for 39 epoches. The performance matrices (Mean Square Error) MSE is less than 10-6 in 39th epoch as shown in Fig. 9. VI. CONCLUSIONS This paper introduces and evaluates learning schemes that are based on artificial neural networks and can be used for discovering the performance (e.g. data rate) that can be achieved by a specific radio configuration in a cognitive radio system. So predicted data rate can be used to decide the next radio configuration. In order to design and use an appropriate neural network structure, performance analysis has been done in simulation environment. The results have been presented and discussed in order to show the benefits of incorporating neural network based learning schemes into cognitive radio systems. REFERENCES [1] J. Mitola, ―Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio‖, Ph.D. thesis, Royal Institute of Technology, 2000. [2] Simon Haykin, ―Cognitive Radio: Brain-Empowered wireless communications‖, IEEE Journal on Selected Areas in Communications, Vol. 23, No. 2, pp 201-220, February 2005.
  • 5. Rita Mahajan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.51-55 www.ijera.com 55 | P a g e [3] Cristian Ianculescu, Andy Mudra, ―Cognitive radio and dynamic spectrum sharing‖ Proceeding of the SDR 05 Technical Conference and Product Exposition, pp 1-5, 2005. [4] Baldo N, Zorzi M. ―Learning and adaptation in cognitive radios using neural networks‖, 1st IEEE workshop on cognitive radio networks (in conjunction with IEEE CCNC 2008), 12 Jan., 2008, Las Vegas, Nevada, USA. [5] Tsagkaris K, Katidiotis A, Demestichas P. ―Neural network-based learning schemes for cognitive radio systems‖, Computer Communications, 2008;31(14):3394–3404. [6] An He, Kyung Kyoon Bae, Timothy R. Newman, Joseph Gaeddert, Kyouwoong Kim, Rekha Menon, Lizdabel Morales- Tirado, James Jody Neel, Youping Zhao,Jeffrey H. Reed, and William H. Tranter, ―A Survey of Artificial Intelligence for Cognitive Radios‖ IEEE Transactions on Vehicular Technology, VOL. 59, NO. 4, MAY 2010, pp 1578-1592. [7] Xuezhi Tan, Haoqin Huang, Lin Ma, ― Frequency Allocation with Artificial Neural Networks in Cognitive Radio System‖, IEEE Tencon 2013, pp 366-370 [8] Hossein Shokri-Ghadikolaei, Younes Abdi, Masoumeh Nasiri-Kenari, ―Analytical and learning-based spectrum sensing time optimisation in cognitive radio systems‖, IET Communications, Vol. 7, Issue 5, 2013, pp. 480–489. [9] Y. Tawk, J. Costantine, E. Al-Zuraiqi, and C. G. Christodoulou, ―Cognitive Radio Antennas that Learn and Adapt Using Neural Networks‖, Radio Science Meeting (USNC-URSI NRSM), US National Committee of URSI National, 9-12 Jan, 2013. [10] Tumuluru V.K. , Ping Wang and Niyato D. ,―A Neural Network Based Spectrum Prediction Scheme for Cognitive Radio‖, IEEE International Conference on Communications (ICC), 2010, pp 1 - 5