39
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Bandwidth reduction in cognitive radio

      Preprint
      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Due to mushroom development of wireless devices cognitive radio is used to resolve the bandwidth utilization and sacristy problem. The crafty usage of bandwidth in cognitive radio based on error correcting codes is ensured to accomodate un authorized user. This study proposes a transmission model by which a finite sequence of binary cyclic codes constructed by a binary BCH code of length \(n=2^{s}-1\), in which all codes have same error correction capability and code rate but sequentially increasing code lengths greater than \(n\). Initially all these codes are carrying data of their corresponding primary users. A transmission pattern is planned in the sprit of interweave model deals the transmission parameters; modulation scheme, bandwidth and code rate. Whenever, any of the primary users having mod of transmission, the binary cyclic code, is not using its allocated bandwidth, the user having its data built by binary BCH code enter and exploit the free path as a secondary user. Eventually whenever the primary user with \(W\) bandwidth having binary BCH code for its data transmission, change its status as a secondary user, it just requires the bandwidth less than \(W\).

          Related collections

          Author and article information

          Journal
          2013-04-04
          Article
          1304.1459
          3c30776f-cad0-4315-8b8d-7169cf57ae78

          http://arxiv.org/licenses/nonexclusive-distrib/1.0/

          History
          Custom metadata
          11T71, 68P30, 94A15
          10 pages
          cs.IT math.IT

          Numerical methods,Information systems & theory
          Numerical methods, Information systems & theory

          Comments

          Comment on this article