2019
DOI: 10.1155/2019/9385693
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis and Optimization of CRNs Based on Fixed Feedback Probability Mechanism with Two Classes of Secondary Users

Abstract: In this paper, we conduct a research based on the classified secondary users (SUs). SUs are divided into two categories: higher-priority SU1 and lower-priority SU2, and two types of users generate two types of packets, respectively. Due to the lowest spectrum usage rights of SU2 packets, the SU2 packets’ transmission is easily interrupted by other packets with higher rights. With the purpose of controlling the SU2 packets’ retransmission behavior, we introduce two system parameters, namely, feedback threshold … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…, respectively. According to the Early Arrival System (EAS) assumption, each service completion of user packets occurs at the end of the slot (t − , t), and each arrival occurs at the beginning of the slot (t, t + ) [17]. We mark PU packets' amount at time t + as P t and SU packets' amount at time t + as S t and call P t system level and S t system phase.…”
Section: Model Buildingmentioning
confidence: 99%
“…, respectively. According to the Early Arrival System (EAS) assumption, each service completion of user packets occurs at the end of the slot (t − , t), and each arrival occurs at the beginning of the slot (t, t + ) [17]. We mark PU packets' amount at time t + as P t and SU packets' amount at time t + as S t and call P t system level and S t system phase.…”
Section: Model Buildingmentioning
confidence: 99%
“…e cognitive radio (CR) technology is a promising technology to solve the spectrum resource scarcity problem. On the basis of sensing and adjusting the working parameters, the secondary users or unlicensed users can dynamically access the spectrum holes, i.e., the unused radio resources, which are initially owned by the primary users or licensed users [1,2].…”
Section: Introductionmentioning
confidence: 99%