2016
DOI: 10.1007/978-3-319-20445-1
|View full text |Cite
|
Sign up to set email alerts
|

Opportunistic Spectrum Utilization in Vehicular Communication Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 139 publications
(157 reference statements)
0
3
0
Order By: Relevance
“…In Table III, the computational complexity of both the entropy-based weighted voting and equally-weighted voting schemes are compared with respect to the amount of mathematical operations they each perform. The operations of Equations (11) and (12) are listed in the first two lines of the table. These operations are performed M + 1 times, which is obtained from the M number of neighbors as well as the ego vehicle itself.…”
Section: Computational Complexity and Process Latencymentioning
confidence: 99%
See 1 more Smart Citation
“…In Table III, the computational complexity of both the entropy-based weighted voting and equally-weighted voting schemes are compared with respect to the amount of mathematical operations they each perform. The operations of Equations (11) and (12) are listed in the first two lines of the table. These operations are performed M + 1 times, which is obtained from the M number of neighbors as well as the ego vehicle itself.…”
Section: Computational Complexity and Process Latencymentioning
confidence: 99%
“…As an alternative to using Digital Television (DTV) band, Ghandour et al proposed the usage of the 5.8 GHz ISM band for secondary connected vehicle users in [10]. Although this idea has the benefit of not requiring to perform primary user detection, it also has several drawbacks such as other users utilizing the ISM band and the CSMA/CA mechanism causing extra process latency [11].…”
Section: Introductionmentioning
confidence: 99%
“…Cognitive VANET in near future will take advantage of licensed spectrum utilization by allocation of unused spectrum pool to cognitive users (Secondary Users) for V2I or V2V communication. For that purpose, a vehicle in cognitive VANET system will observe first any particular spectrum which is idle for a long duration before accessing it [4]. With this intentions, that detection mechanism must be an artifact scheme, which senses the primary user (Licensed Users) signal presence with high detection possibility, while maintaining the erroneous exploration extremely small.…”
Section: Introductionmentioning
confidence: 99%