SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol.8, No.6, December 2018, pp. 5169~5177
ISSN: 2088-8708, DOI: 10.11591/ijece.v8i6.pp5169-5177  5169
Journal homepage: http://iaescore.com/journals/index.php/IJECE
Multi-Channel Preemptive Priority Model for Spectrum
Mobility in Cognitive Radio Networks
S. E. Saad1
, I. F. Tarrad2
, A. A. Ammar3
1
Departement of Electronics and Communications Engineering, High Institute for Engineering and Technology, Egypt
2, 3
Electrical Engineering Department, Faculty of Engineering, Al-Azhar University, Egypt
Article Info ABSTRACT
Article history:
Received Mar 2, 2018
Revised Jul 24, 2018
Accepted Aug 11, 2018
Cognitive Radio techniques have been proposed for improving utilization of
the spectrum by exploiting the unoccupied bands of the licensed spectrum.
This paper proposes a preemptive multi-channel access model for prioritized
cognitive radio networks using an iterative method of queuing theory to solve
the spectrum scarcity problem. The proposed model formulates accurate
closed form of an expected waiting time in the queue, an expected number of
users in the queue, an expected waiting time in the system, and an expected
number of users in the system. The results compared to the basic model
(without preemptive priority) show that, the waiting time in queue and the
waiting time in the system compared to the basic model will be improved by
92.99% and 33.15% respectively for class one secondary user. The results
also show that, the waiting time in queue and the waiting time in the system
will be improved by 43.25% and 15.42% respectively for class two
secondary users. The proposed model investigates the desirable schedules of
primary and secondary users.
Keyword:
Cognitive Radio
Multi-Channel
Preemptive Priority
Queuing Theory
Spectrum Mobility
Copyright © 2018Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
S. E. Saad,
Departement of Electronics and Communications Engineering,
High Institute for Engineering and Technology, Al-Obour,
Kilo 21 Cairo / Belbies Rd, Egypt-P.O. Box 27 Obour City, Egypt.
Email: s.elsayed8585@gmail.com
1. INTRODUCTION
During the last decade, the wireless communications have been developed. The actual spectral
occupancy over some frequency bands studied was found to be virtually empty. In O.W. Bello et al authors
carried out spectrum measurement in urban and rural locations, covering bands of 50 MHz and 6 GHz [1].
The results show that, the average spectral occupancy of 5.08% and 0.18% in urban and rural locations
respectively during weekdays and 1.45% on weekends for urban locations. So, the limited available spectrum
and the inefficiency using of the spectrum have become one of the current problems in wireless
communications. Cognitive radio technique has been proposed as a solution to these problems.
The cognitive radio technology is based on the opportunistic usage of the spectrum by allowing
unlicensed users to exploit frequency bands of licensed users. Opportunistic spectrum access involves two
tasks of cognitive radio system: spectrum sensing and dynamic spectrum access.
Many spectrum sensing techniques have been recently studied, namely Energy detection [2], hybrid
spectrum sensing method [3], discrete markov chain based method [4], eigen value based spectrum sensing
[5], and matched filter detector and cyclostationary detector [6]-[7].
Many dynamic spectrum access models have been studied. In L. Chen et al the authors proposed
M/M/1 queue which is represented by a two dimensional state transition graph [8]. The authors proposed a
queuing model for heterogeneous data transmissions in underlay cognitive radio networks. In this model,
 ISSN:2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5169 - 5177
5170
safety or emergency related messages possess preemptive higher priority over nonemergency messages. This
model has two classes; high priority for primary user and low priority for secondary user.
In M.E. Bayrakdar and A. Çalhan non-preemptive M/G/1 priority queuing model of spectrum hand-off
scheme was proposed in cognitive radio networks [9-10]. In T.C. Chu et al, the authors proposed a Dynamic
Spectrum Access scheme for cognitive radio networks, where priorities for the bandwidth, the spectrum
access, and spectrum hand-off are considered for three types of traffics [11]. Paper has adopted a multi-
dimensional Markov chain with three state variables to analyze the state transitions of the dynamic spectrum
access scheme which enables us to obtain the steady state distribution of the number of each kind of traffics
in the system.
It is very difficult to analyze the behavior of multi-channel of the priority queue model when
channel usage by primary and secondary users [12]. Although the vast research on the analysis of priority
queues with a single channel facility, efforts on the characterization of multi channel queues were not as
extensive or fruitful due to their complications. This is essentially unfortunate since the modeling of many
telecommunications problems can be suitably placed in the framework of a multi channel system, such as
multi channel cognitive radio networks [13].
In this paper, multi-channel preemptive priority model based on queuing theory has been proposed
as a solution to this problem. The main contributions of this paper are as follows:
1. Queuing based spectrum access scheme for prioritized cognitive radio networks is proposed.
2. An accurate analytical model for spectrum access queuing based scheme priority service discipline is
derived.
3. The proposed model can be applied for multi-priority secondary user.
4. The proposed model can be generalized for multi-channels.
The rest of this paper is organized as follows: In Section 2, the proposed model has been introduced.
The simulation results of the proposed model have been discussed in Section 3. Finally, Section 4 presents
the conclusion of the proposed model.
2. PROPOSED MODEL
In this section, a proposed model based on queuing theory has been presented. Symbols and
notations used in this paper are listed in Table 1.
Table 1. The Description of Symbols
Symbol Description
𝜆p Mean arrival rate of the primary user
𝜆si Mean arrival rate of class i secondary user
𝜆 Mean arrival rate of all users
µ mean service rate
𝜌 Utilization factor it’s = λ/Cμ
C number of channels in the system
𝑃𝑛
probability of exactly n users in the system
𝐿 𝑠
Average number of users in the system
𝐿 𝑞
Average number of users in the waiting buffer
𝑊𝑝
Average waiting time of the primary users in the system
𝑊si
Average waiting time of users in the system
𝑊𝑞
Average waiting time of users in buffer
2.1. Primary User Model
In this model, there are several channels used by primary users and can only be used by secondary
users when the channels are free. There are three possible cases; the arrived primary user may be encounter:
1. There is an empty channel so; the primary user will be accessed.
2. There isn't an empty channel and secondary user in service so; the secondary user will be ejected to
waiting buffer and primary user accessed.
3. There is neither an empty channel nor secondary user in service so; the primary user enters the queue.
Int J Elec& Comp Eng ISSN: 2088-8708 
Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks (S. E. Saad)
5171
Figure 1. Primary User Model
Figure 1 represents the possible three cases when the primary user has arrived.
2.2. Secondary User Model
The secondary users keep searching for channels that are free (available for use) at some points in
time. There are three possible cases; the secondary user may be encounter:
1. There is an empty channel so; the secondary user will be accessed.
2. There isn't an empty channel and there is lower priority secondary user in service so; the lower priority
secondary user will be ejected to waiting buffer and the higher priority user will be accessed.
3. There is neither an empty channel nor lower priority secondary user in service so; the arrived secondary
user enters the queue.
Figure 2. Secondary User Model
 ISSN:2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5169 - 5177
5172
Figure 2 shows the possible three cases; the secondary user may be encounter. Users are selected to
begin service in the order of their priority classes, but on a first come first served basis within each class.
There are two basic priority discipline models, preemptive priorities and non-preemptive priorities.
Preemptive priorities mean that, the lowest priority user being served is preempted whenever a higher priority
user enters the system. Non-preemptive priorities, a user being served cannot be preempted if a higher
priority user enters the queueing system. In this paper, the preemptive priority model has been selected.
2.3. Analytical Model
In this model, assume that; the arriving users and leaving users of the queuing system occur
according to the birth and death process. However, the term birth refers to the arrival of a new user into the
system, and death refers to the departure of a served user.
The solution has the following steps according to the general method described in [14]:
1. Obtain the steady state equations governing the queue.
2. Solve the equations for finding out the probability distribution of queue length by: a) Iterative method. b)
Using generating functions. c) Using linear operators.
3. Obtain formula for Ls, Lq, Ws and, Wq as shown in Table 1.
After constructing the balance equations for all the states in terms of the 𝑃𝑛 probabilities, this
system of equations can be solved.
By Applying this procedure yields
𝑃𝑛 =
{
1
𝑛!
. (
𝜆
𝜇
) 𝑛
𝑃0 𝑓𝑜𝑟 0 ≤ 𝑛 < 𝐶
1
𝐶!. 𝐶 𝑛−𝐶
. (
𝜆
𝜇
) 𝑛
𝑃0 𝑓𝑜𝑟 𝑛 ≥ 𝐶
(1)
A queueing model is based on the birth and death process, so the state of the system n represents the
number of users in the queueing system, the key measures of performance for the queueing system (L, Lq,
W, and Wq) can be obtained.
From definition of 𝐿 𝑞
𝐿 𝑞 = ∑(𝑛 − 𝐶)𝑃𝑛
∞
𝑛=𝐶
(2)
By solving this equation we get
𝐿 𝑞 =
1
𝐶. 𝐶!
.
(𝐶𝜌) 𝐶+1
(1 − 𝜌)2
. 𝑃0 (3)
It has been proved that in a steady state queuing system,
L = λ W (4)
This equation is called Little’s formula.
Assume that the mean service time is a constant,
1
μ
. It then follows that
W = Wq +
1
μ
(5)
These relationships are extremely important because they enable the fundamental parameters Lq,
Wq, L, and W to be immediately determined as soon as one is found analytically. This relation is fortunate
because some of these quantities often are much easier to find than others when a queuing model is solved
from basic principles.
2.4. The Average Waiting Time in the System
For Preemptive priority, waiting time for primary users must equal waiting time for the
corresponding one class model. Because the waiting times for primary users are completely unaffected by the
Int J Elec& Comp Eng ISSN: 2088-8708 
Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks (S. E. Saad)
5173
presence of users in the secondary classes, waiting time will be the same for any other values of arrival rates ,
including λsi = 0. The waiting time for primary user can be formulated from Equations (3), (4), and (5):
Wp =
1
[ c!
(cμ− λ)
(
λ
μ
)c
∑
(
λ
μ
)n
n!
+ c μ] [1 −
λp
c μ
]c−1
n=0
+
1
μ (6)
Waiting time for secondary user can be calculated by an iterative procedure.
Class one secondary user is completely unaffected by lower-priority classes, which can therefore be
ignored in the analysis. Let WX1 be the expected waiting time in the system of a random arrival in either of
these primary users and class one secondary users:
Wx1 =
1
[ c!
(cμ− λx1)
(
λx1
μ
)c
∑
(
λx1
μ
)n
n!
+ c μ] [1 −
λx1
c μ
]c−1
n=0
+
1
μ (7)
λx1 = λp + λs1 (8)
So the probability is that this arrival is primary user
λp
λp+ λs1
and
λs1
λp+ λs1
, that it is in class one secondary user.
Therefore, Wx1 =
λp
λp+ λs1
Wp +
λs1
λp+ λs1
Ws1 (9)
Ws1 =
λp + λs1
λs1
Wx1 −
λp
λs1
Wp (10)
For class two secondary user: Let WX2 be the expected waiting time in the system of a random
arrival in either of these primary users, class one secondary users, and class two secondary users:
Wx2 =
1
[ c!
(cμ− λx2)
(
λx2
μ
)c
∑
(
λx2
μ
)n
n!
+ c μ] [1 −
λx2
c μ
]c−1
n=0
+
1
μ (11)
λx2 = λp + λs1 + λs2 (12)
Wx2 =
λp
λp + λs1 + λs2
Wp +
λs1
λp + λs1 + λs2
Ws1 +
λs2
λp + λs1 + λs2
Ws2 (13)
Ws2 =
λp + λs1 + λs2
λs2
Wx2 −
λs1
λs2
Ws1 −
λp
λs2
Wp (14)
The waiting time for class three can be derived with the same procedures, and the other three
parameters can be easily formulated by using equations (4), and (5).
3. SIMULATION RESULTS
This section evaluates the proposed model using MATLAB. Results have been carried out by
varying the arrival rate of the primary users. The proposed model has been evaluated by four metrics namely,
expected waiting time in queue, expected number of users in queue, expected waiting time in the system, and
expected number of users in the system. Results have been obtained in the case of five channels.
3.1. Comparison between The Proposed Model and The Basic Model Queue in [15]
Authors in [15] provide the description and comparison of 13 structured and simulation modeling
systems (SSMS). Structural and simulation modeling systems are compared to each other. Structural model
simulated in [15] proposed queuing model without priority. In this subsection, results obtained from the
proposed model will be compared with the results in [15]. The parameters used in this simulation are the
same as the parameters used in [15].
 ISSN:2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5169 - 5177
5174
Table 2. Comparison of the Proposed Model with the Basic Model in [15]
Parameter
Proposed Model
Results of
[15]PU SU1 SU2 SU3
Total
Network
Lq 0.0001939 0.0084 0.0657 0.2799 0.3541939 0.354
L 0.7502 0.7584 0.8157 1.0299 3.3542 3.354
Wq 0.0077572 0.3374869 2.6267 11.197 3.542236 3.542
W 30.008 30.337 32.627 41.197 33.54225 33.542
As shown in Table 2, total results obtained from the proposed model are the same as the results in
[15]. All measured time values in unit time. This simulation has been performed to prove that, the proposed
model is validated by comparing the total results achieved with the results of the conventional model.
In I. Yakimov et al a conventional queuing model without priority was presented, which does not
meet the requirements for cognitive radio networks [15]. This paper proposes a model for multi-channel,
multi-classes cognitive radio networks using the preemptive priority model based on queuing theory. A
performance analysis in the most general form can be conducted by the proposed model. In the next
subsection, the proposed model will be analyzed to ensure priority for primary users and ensure priority for
higher class secondary user over lower class at a different arrival rate.
3.2. Performance Evaluation of the Proposed Model at Different Request Rate
In this simulation, the arrival rate of the primary users may vary between 0.01-4 request/sec. In this
analysis, the arrival rate of the seconddary users is 4 request/sec for each class, and the service rate is 4
request/sec for each channel.
Figure 3. Expected Waiting Time in the Queue Figure 4. Expected Waiting Time in the System
The performance in terms of waiting time in buffer is shown in Figure 3. It can be observed that, the waiting
time in buffer for primary user is the lowest in the system. Results show that, at the point of λp = 4, λs1 = λs2 =
λs3 = 4 request/sec; Waiting time for primary and three classes of secondary user is 0.24 ms, 9.7 ms, 78.6 ms,
and 465.6 ms respectively. We can examine the effect of priority schedule at this point. The waiting time in
the queue without priority is 138.5 ms, so, the priority schedule improves the waiting time in queue for class
one secondary users, and class two secondary users by 92.99%, and 43.25% respectively compared to the
basic model without priority.
It is important to note that, the average of waiting time for all users of the proposed model at any
point is exactly equal to the waiting time in the queue without priority First Come First Serve (FCFS)
discipline at the same point, so, the average of waiting time for all users at the point λp = 4, λs1 = λs2 = λs3 =
4 request/sec is 138.5 ms. It is observed that the waiting time in queue increases in an exponential order as
the arrival rate of primary users increased.
Int J Elec& Comp Eng ISSN: 2088-8708 
Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks (S. E. Saad)
5175
Figure 4 shows that, at the point of λp = 4 request/sec; waiting time for primary and three classes of
secondary user is 250.24 ms,259.7 ms, 328.6 ms, and 715.6 ms respectively. To study the impact of
priorities, the waiting time in the system without priority is 388.5 ms so, the priority schedule improves the
waiting time in class one secondary users, and class two secondary users by 33.15%, and 15.42%
respectively.
As the primary user arrival rate increases, then due to high priority, the primary user takes the
channel from secondary user and the secondary user will be ejected to waiting buffer. Further, as the primary
users use more channels in the system, then the waiting time to the secondary users should increase as
depicted in Figures 3 and 4. Then, if there isn't an empty channel for secondary user and there is lower
priority secondary user in service so; the lower priority secondary user will be ejected to waiting buffer and
the higher priority secondary user will be accessed. Consequently, the lower priority secondary user will be
more affected by increasing the primary user arrival rate.
Figure 5. Expected Number of Users in Waiting Figure 6. Expected Number of Users in System
As shown in Figure 5, the number of users in the waiting buffer for primary users is lower than
others users. Results show that, at the point of λp = 4request/sec; number of users in the waiting buffer for
primary and three classes of secondary user is 0.00096, 0.0388, 0.3144, and 1.86 respectively. To study the
impact of priorities, the waiting time in the system without priority is 2.22 so; the priority schedule improves
the waiting time in class one secondary users, and class two secondary users by 93%, and 43.35%
respectively.
Figure 6 shows that, the number of users in the system for primary users are lower than others users.
Results show that, at the point λp = 4request/sec; number of users in the system for primary and three classes
of secondary user is 1.001, 1.0388, 1.3144, and 2.8622 respectively. To study the impact of priorities, the
number of users in the system without priority is 6.22 so; the priority schedule improves the number of users
in the system in class one secondary users, and class two secondary users by 33.2%, and 15.47%
respectively.
From the performance analysis results, it is concluded that, at the arrival rate of the primary user
increases, the waiting time and the number of users increase, but the priority of each class is reserved. The
waiting time for primary users are completely unaffected by the presence of users in the secondary classes.
In most previous studies, the authors consider that the secondary user is a single class. This
consideration does not meet the needs of multiple applications for the use of cognitive radio. Therefore, the
model presented in this paper is a solution to this problem. Compared with the previous works [8- 10, 12], the
authors have assumed the cognitive radio networks by assuming the problem as a single channel. However,
these models do not adequately overcome the need to analyze of cognitive radio networks as they have
multiple channels. Therefore, the model presented in this paper can be efficiently used to analyze the
behavior of multi-channel of the priority queue model for cognitive radio networks.
 ISSN:2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5169 - 5177
5176
4. CONCLUSION
In this paper, priority based preemptive queuing model has been proposed for channel access in
cognitive radio networks. Steady state analysis of the proposed model is presented. Preemption priority is
utilized to meet requirements of the class one and class two secondary users. The proposed model gives the
commendable schedules of primary and secondary users.This work can be extended to evaluate a preemptive
priority discipline in event simulator, and can be extended to analyze the performance in the case of finite
size of waiting buffer.
REFERENCES
[1] O.W. Bello, O.A. Sowande, S.O. Onidare, M.Y. Muhammada, and A.A. Ayeni, “Large scale spectrum survey in
rural and urban environments within the 50 MHz–6 GHz bands”, Elsevier, Measurement Journal 91, 2016.
[2] F.Z. El Bahi, H. Ghennioui, and M. Zouak, ” Performance Evaluation of Energy Detector Based Spectrum Sensing
for Cognitive Radio using NI USRP-2930”, International Journal of Electrical and Computer Engineering
(IJECE), vol. 7, no. 4, pp. 1934 – 1940, 2017.
[3] A.S. Khobragade1, and R. D. Raut, ” Hybrid Spectrum Sensing Method for Cognitive Radio”, International
Journal of Electrical and Computer Engineering (IJECE), vol. 7, no.5, pp. 2683 – 2695, 2017.
[4] Mohammadreza Amini, Asra Mirzavandi, Mosrafa Rezaei, “Discrete Markov Chain Based Spectrum Sensing for
Cognitive Radio”, International Journal of Electrical and Computer Engineering (IJECE), vol. 5, no. 2, pp. 297 –
30, 2015.
[5] S.S. Ali, C. Liu, and M. Jin, “Minimum Eigenvalue Detection for Spectrum Sensing in Cognitive Radio”,
International Journal of Electrical and Computer Engineering (IJECE), vol. 4, no. 4, p. 623, 2014.
[6] H. Sun, A. Nallanathan, C.X. Wang, and Y. Chen, “Wideband spectrum sensing for cognitive radio networks: a
survey”, IEEE Wirel. Commun., vol. 20, no. 2, pp. 7481, 2013.
[7] J. Avila, and K. Thenmozhi, “Multiband OFDM for Cognitive Radio – A Way for Cyclostationary Detection and
Interference Cancellation”, International Journal of Electrical and Computer Engineering (IJECE), vol. 6, no. 4,
pp. 1702 – 1709, 2016.
[8] L. Chen, L. Huang, H. Xu, and J. Hu, “Queueing Analysis for Preemptive Transmission in Underlay Cognitive
Radio Networks”, International Journal of Communication Systems, 29: 1138–1155. doi: 10.1002., John Wiley &
Sons, Ltd, 2016.
[9] M.E. Bayrakdar, and, A. Çalhan, “Improving spectrum handoff utilization for prioritized cognitive radio users by
exploiting channel bonding with starvation mitigation”, Elsevier, International Journal of Electronics and
Communications (AEÜ), 2017.
[10] M.E. Bayrakdar, and, A. Çalhan, “Non-Preemptive Queueing Model of Spectrum Handoff Scheme based on
Prioritized Data Traffic in Cognitive Wireless Networks”, ETRI Journal, 39 (4), 558-569, 2017.
[11] T.C. Chu, H. Phan, and H. Zepernick, “Dynamic Spectrum Access for Cognitive Radio NetworksWith Prioritized
Traffics”, IEEE communications letters, Vol. 18, NO. 7, 2014.
[12] V. Kumar, S. Minz , and Vipin Kumar, “Performance analysis of cognitive radio networks under spectrum sharing
using queuing approach”, Elsevier, Computers and Electrical Engineering 52, 2016.
[13] Navid Tadayon, “Modeling, Design and Analysis of Multi-Channel Cognitive Radio Networks”, PHD Thesis,
2016.
[14] P. Kandasamy, K. Thilagavathi, and K. Gunavathi, “Probability statistics and Queuing theory”, S. Chand
&Company LTD., New Delhi, 2006.
[15] I. Yakimov, A. Kirpichnikov, V. Mokshin, Z. Yakhina, and R. Gainullin, “The Comparison of Structured Modeling
and Simulation Modeling of Queueing Systems”, 16th International Conference, Information Technologies and
Mathematical Modelling (ITMM), Queueing Theory and Applications, Springer, 2017.
Int J Elec& Comp Eng ISSN: 2088-8708 
Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks (S. E. Saad)
5177
BIOGRAPHIES OF AUTHORS
Saad Elsayed is an Assistant Lecturer in the High Institute for Engineering and Technology, Al-
Obour, Cairo, Egypt. He received his BSc and MSc in Electronics and Communications
Engineering from the Faculty of Engineering, Al-Azhar University, Cairo, Egypt, in 2008 and
2015 respectively. He is currently a PhD student at Faculty of Engineering, Al-Azhar university,
Cairo. His research activities are within wireless communications and communication networks.
Ibrahim Fathy Tarrad received his BSc and MSc degrees in Electronics and Communications
Engineering from the Faculty of Engineering, Al-Azhar University, Cairo, Egypt, in 1984 and
1989, respectively. He received his PhD from the Technical University of Budapest in 1996. In
1996, he was appointed Lecturer at the Department of Electronics and Communications
Engineering, Al-Azhar University. In 2015, he became an Associate Professor in
Communications Engineering at the Faculty of Engineering, Al-Azhar University. His research
activities are within wireless communications and digital communications.
Abdelhady Abdelazim Ammar is a professor in Electronics and Communications Engineering
department, Faculty of Engineering, Al-Azhar University, Cairo, Egypt since 1988.
His research activities are within digital communications, mobile communications and digital
signal processing.

More Related Content

What's hot

A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
 
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networks
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networksGenetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networks
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networksIJECEIAES
 
IRJET- Channel and Rate Selection in Cognitive Radio Network
IRJET- Channel and Rate Selection in Cognitive Radio NetworkIRJET- Channel and Rate Selection in Cognitive Radio Network
IRJET- Channel and Rate Selection in Cognitive Radio NetworkIRJET Journal
 
Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...
Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...
Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...IJAAS Team
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile networkBasil John
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
 
Routing in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyRouting in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyIJERA Editor
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...IJECEIAES
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...
Review and Comparisons between Multiple Ant Based Routing  Algorithms in Mobi...Review and Comparisons between Multiple Ant Based Routing  Algorithms in Mobi...
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...IJMER
 
Analytical Study of Dedicated Network for IOT using LoRaWAN Technologies
Analytical Study of Dedicated Network for IOT using LoRaWAN TechnologiesAnalytical Study of Dedicated Network for IOT using LoRaWAN Technologies
Analytical Study of Dedicated Network for IOT using LoRaWAN TechnologiesIRJET Journal
 
Generalized optimal placement of PMUs considering power system observability,...
Generalized optimal placement of PMUs considering power system observability,...Generalized optimal placement of PMUs considering power system observability,...
Generalized optimal placement of PMUs considering power system observability,...IJECEIAES
 
Performance evaluation of decode and forward cooperative diversity systems ov...
Performance evaluation of decode and forward cooperative diversity systems ov...Performance evaluation of decode and forward cooperative diversity systems ov...
Performance evaluation of decode and forward cooperative diversity systems ov...IJECEIAES
 
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs) A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs) IJMER
 
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...IRJET Journal
 
Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks IJECEIAES
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos incaijjournal
 

What's hot (20)

A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
 
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networks
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networksGenetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networks
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networks
 
IRJET- Channel and Rate Selection in Cognitive Radio Network
IRJET- Channel and Rate Selection in Cognitive Radio NetworkIRJET- Channel and Rate Selection in Cognitive Radio Network
IRJET- Channel and Rate Selection in Cognitive Radio Network
 
Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...
Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...
Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile network
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
 
Routing in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyRouting in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A Survey
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...
Review and Comparisons between Multiple Ant Based Routing  Algorithms in Mobi...Review and Comparisons between Multiple Ant Based Routing  Algorithms in Mobi...
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...
 
Tsp2008 lp feng
Tsp2008 lp fengTsp2008 lp feng
Tsp2008 lp feng
 
Analytical Study of Dedicated Network for IOT using LoRaWAN Technologies
Analytical Study of Dedicated Network for IOT using LoRaWAN TechnologiesAnalytical Study of Dedicated Network for IOT using LoRaWAN Technologies
Analytical Study of Dedicated Network for IOT using LoRaWAN Technologies
 
Generalized optimal placement of PMUs considering power system observability,...
Generalized optimal placement of PMUs considering power system observability,...Generalized optimal placement of PMUs considering power system observability,...
Generalized optimal placement of PMUs considering power system observability,...
 
Ad04507176183
Ad04507176183Ad04507176183
Ad04507176183
 
Performance evaluation of decode and forward cooperative diversity systems ov...
Performance evaluation of decode and forward cooperative diversity systems ov...Performance evaluation of decode and forward cooperative diversity systems ov...
Performance evaluation of decode and forward cooperative diversity systems ov...
 
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs) A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
 
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
 
Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 

Similar to Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Radio Networks

IRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum AllocationIRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum AllocationIRJET Journal
 
Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio IJECEIAES
 
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...eSAT Journals
 
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...IJERA Editor
 
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio NetworksEnhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio NetworksIRJET Journal
 
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage EnvironmentClient Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage EnvironmentIRJET Journal
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...IRJET Journal
 
IRJET- Review Paper on Throughput Optimization and Spectrum Sensing in Cognit...
IRJET- Review Paper on Throughput Optimization and Spectrum Sensing in Cognit...IRJET- Review Paper on Throughput Optimization and Spectrum Sensing in Cognit...
IRJET- Review Paper on Throughput Optimization and Spectrum Sensing in Cognit...IRJET Journal
 
A price based spectrum sharing scheme in wireless cellular networks
A price based spectrum sharing scheme in wireless cellular networksA price based spectrum sharing scheme in wireless cellular networks
A price based spectrum sharing scheme in wireless cellular networksAlexander Decker
 
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET Journal
 
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOA SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOijngnjournal
 
International journal of engineering issues vol 2015 - no 2 - paper7
International journal of engineering issues   vol 2015 - no 2 - paper7International journal of engineering issues   vol 2015 - no 2 - paper7
International journal of engineering issues vol 2015 - no 2 - paper7sophiabelthome
 
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET Journal
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networksszhb
 
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...ijeei-iaes
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
 

Similar to Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Radio Networks (20)

E010312832
E010312832E010312832
E010312832
 
IRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum AllocationIRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum Allocation
 
Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio
 
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...
 
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
 
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio NetworksEnhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
 
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage EnvironmentClient Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
 
IRJET- Review Paper on Throughput Optimization and Spectrum Sensing in Cognit...
IRJET- Review Paper on Throughput Optimization and Spectrum Sensing in Cognit...IRJET- Review Paper on Throughput Optimization and Spectrum Sensing in Cognit...
IRJET- Review Paper on Throughput Optimization and Spectrum Sensing in Cognit...
 
H1803064257
H1803064257H1803064257
H1803064257
 
A price based spectrum sharing scheme in wireless cellular networks
A price based spectrum sharing scheme in wireless cellular networksA price based spectrum sharing scheme in wireless cellular networks
A price based spectrum sharing scheme in wireless cellular networks
 
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
 
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOA SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
 
International journal of engineering issues vol 2015 - no 2 - paper7
International journal of engineering issues   vol 2015 - no 2 - paper7International journal of engineering issues   vol 2015 - no 2 - paper7
International journal of engineering issues vol 2015 - no 2 - paper7
 
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
 
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...
Simulation Analysis of Prototype Filter Bank Multicarrier Cognitive Radio Und...
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Radio Networks

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol.8, No.6, December 2018, pp. 5169~5177 ISSN: 2088-8708, DOI: 10.11591/ijece.v8i6.pp5169-5177  5169 Journal homepage: http://iaescore.com/journals/index.php/IJECE Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks S. E. Saad1 , I. F. Tarrad2 , A. A. Ammar3 1 Departement of Electronics and Communications Engineering, High Institute for Engineering and Technology, Egypt 2, 3 Electrical Engineering Department, Faculty of Engineering, Al-Azhar University, Egypt Article Info ABSTRACT Article history: Received Mar 2, 2018 Revised Jul 24, 2018 Accepted Aug 11, 2018 Cognitive Radio techniques have been proposed for improving utilization of the spectrum by exploiting the unoccupied bands of the licensed spectrum. This paper proposes a preemptive multi-channel access model for prioritized cognitive radio networks using an iterative method of queuing theory to solve the spectrum scarcity problem. The proposed model formulates accurate closed form of an expected waiting time in the queue, an expected number of users in the queue, an expected waiting time in the system, and an expected number of users in the system. The results compared to the basic model (without preemptive priority) show that, the waiting time in queue and the waiting time in the system compared to the basic model will be improved by 92.99% and 33.15% respectively for class one secondary user. The results also show that, the waiting time in queue and the waiting time in the system will be improved by 43.25% and 15.42% respectively for class two secondary users. The proposed model investigates the desirable schedules of primary and secondary users. Keyword: Cognitive Radio Multi-Channel Preemptive Priority Queuing Theory Spectrum Mobility Copyright © 2018Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: S. E. Saad, Departement of Electronics and Communications Engineering, High Institute for Engineering and Technology, Al-Obour, Kilo 21 Cairo / Belbies Rd, Egypt-P.O. Box 27 Obour City, Egypt. Email: s.elsayed8585@gmail.com 1. INTRODUCTION During the last decade, the wireless communications have been developed. The actual spectral occupancy over some frequency bands studied was found to be virtually empty. In O.W. Bello et al authors carried out spectrum measurement in urban and rural locations, covering bands of 50 MHz and 6 GHz [1]. The results show that, the average spectral occupancy of 5.08% and 0.18% in urban and rural locations respectively during weekdays and 1.45% on weekends for urban locations. So, the limited available spectrum and the inefficiency using of the spectrum have become one of the current problems in wireless communications. Cognitive radio technique has been proposed as a solution to these problems. The cognitive radio technology is based on the opportunistic usage of the spectrum by allowing unlicensed users to exploit frequency bands of licensed users. Opportunistic spectrum access involves two tasks of cognitive radio system: spectrum sensing and dynamic spectrum access. Many spectrum sensing techniques have been recently studied, namely Energy detection [2], hybrid spectrum sensing method [3], discrete markov chain based method [4], eigen value based spectrum sensing [5], and matched filter detector and cyclostationary detector [6]-[7]. Many dynamic spectrum access models have been studied. In L. Chen et al the authors proposed M/M/1 queue which is represented by a two dimensional state transition graph [8]. The authors proposed a queuing model for heterogeneous data transmissions in underlay cognitive radio networks. In this model,
  • 2.  ISSN:2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5169 - 5177 5170 safety or emergency related messages possess preemptive higher priority over nonemergency messages. This model has two classes; high priority for primary user and low priority for secondary user. In M.E. Bayrakdar and A. Çalhan non-preemptive M/G/1 priority queuing model of spectrum hand-off scheme was proposed in cognitive radio networks [9-10]. In T.C. Chu et al, the authors proposed a Dynamic Spectrum Access scheme for cognitive radio networks, where priorities for the bandwidth, the spectrum access, and spectrum hand-off are considered for three types of traffics [11]. Paper has adopted a multi- dimensional Markov chain with three state variables to analyze the state transitions of the dynamic spectrum access scheme which enables us to obtain the steady state distribution of the number of each kind of traffics in the system. It is very difficult to analyze the behavior of multi-channel of the priority queue model when channel usage by primary and secondary users [12]. Although the vast research on the analysis of priority queues with a single channel facility, efforts on the characterization of multi channel queues were not as extensive or fruitful due to their complications. This is essentially unfortunate since the modeling of many telecommunications problems can be suitably placed in the framework of a multi channel system, such as multi channel cognitive radio networks [13]. In this paper, multi-channel preemptive priority model based on queuing theory has been proposed as a solution to this problem. The main contributions of this paper are as follows: 1. Queuing based spectrum access scheme for prioritized cognitive radio networks is proposed. 2. An accurate analytical model for spectrum access queuing based scheme priority service discipline is derived. 3. The proposed model can be applied for multi-priority secondary user. 4. The proposed model can be generalized for multi-channels. The rest of this paper is organized as follows: In Section 2, the proposed model has been introduced. The simulation results of the proposed model have been discussed in Section 3. Finally, Section 4 presents the conclusion of the proposed model. 2. PROPOSED MODEL In this section, a proposed model based on queuing theory has been presented. Symbols and notations used in this paper are listed in Table 1. Table 1. The Description of Symbols Symbol Description 𝜆p Mean arrival rate of the primary user 𝜆si Mean arrival rate of class i secondary user 𝜆 Mean arrival rate of all users µ mean service rate 𝜌 Utilization factor it’s = λ/Cμ C number of channels in the system 𝑃𝑛 probability of exactly n users in the system 𝐿 𝑠 Average number of users in the system 𝐿 𝑞 Average number of users in the waiting buffer 𝑊𝑝 Average waiting time of the primary users in the system 𝑊si Average waiting time of users in the system 𝑊𝑞 Average waiting time of users in buffer 2.1. Primary User Model In this model, there are several channels used by primary users and can only be used by secondary users when the channels are free. There are three possible cases; the arrived primary user may be encounter: 1. There is an empty channel so; the primary user will be accessed. 2. There isn't an empty channel and secondary user in service so; the secondary user will be ejected to waiting buffer and primary user accessed. 3. There is neither an empty channel nor secondary user in service so; the primary user enters the queue.
  • 3. Int J Elec& Comp Eng ISSN: 2088-8708  Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks (S. E. Saad) 5171 Figure 1. Primary User Model Figure 1 represents the possible three cases when the primary user has arrived. 2.2. Secondary User Model The secondary users keep searching for channels that are free (available for use) at some points in time. There are three possible cases; the secondary user may be encounter: 1. There is an empty channel so; the secondary user will be accessed. 2. There isn't an empty channel and there is lower priority secondary user in service so; the lower priority secondary user will be ejected to waiting buffer and the higher priority user will be accessed. 3. There is neither an empty channel nor lower priority secondary user in service so; the arrived secondary user enters the queue. Figure 2. Secondary User Model
  • 4.  ISSN:2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5169 - 5177 5172 Figure 2 shows the possible three cases; the secondary user may be encounter. Users are selected to begin service in the order of their priority classes, but on a first come first served basis within each class. There are two basic priority discipline models, preemptive priorities and non-preemptive priorities. Preemptive priorities mean that, the lowest priority user being served is preempted whenever a higher priority user enters the system. Non-preemptive priorities, a user being served cannot be preempted if a higher priority user enters the queueing system. In this paper, the preemptive priority model has been selected. 2.3. Analytical Model In this model, assume that; the arriving users and leaving users of the queuing system occur according to the birth and death process. However, the term birth refers to the arrival of a new user into the system, and death refers to the departure of a served user. The solution has the following steps according to the general method described in [14]: 1. Obtain the steady state equations governing the queue. 2. Solve the equations for finding out the probability distribution of queue length by: a) Iterative method. b) Using generating functions. c) Using linear operators. 3. Obtain formula for Ls, Lq, Ws and, Wq as shown in Table 1. After constructing the balance equations for all the states in terms of the 𝑃𝑛 probabilities, this system of equations can be solved. By Applying this procedure yields 𝑃𝑛 = { 1 𝑛! . ( 𝜆 𝜇 ) 𝑛 𝑃0 𝑓𝑜𝑟 0 ≤ 𝑛 < 𝐶 1 𝐶!. 𝐶 𝑛−𝐶 . ( 𝜆 𝜇 ) 𝑛 𝑃0 𝑓𝑜𝑟 𝑛 ≥ 𝐶 (1) A queueing model is based on the birth and death process, so the state of the system n represents the number of users in the queueing system, the key measures of performance for the queueing system (L, Lq, W, and Wq) can be obtained. From definition of 𝐿 𝑞 𝐿 𝑞 = ∑(𝑛 − 𝐶)𝑃𝑛 ∞ 𝑛=𝐶 (2) By solving this equation we get 𝐿 𝑞 = 1 𝐶. 𝐶! . (𝐶𝜌) 𝐶+1 (1 − 𝜌)2 . 𝑃0 (3) It has been proved that in a steady state queuing system, L = λ W (4) This equation is called Little’s formula. Assume that the mean service time is a constant, 1 μ . It then follows that W = Wq + 1 μ (5) These relationships are extremely important because they enable the fundamental parameters Lq, Wq, L, and W to be immediately determined as soon as one is found analytically. This relation is fortunate because some of these quantities often are much easier to find than others when a queuing model is solved from basic principles. 2.4. The Average Waiting Time in the System For Preemptive priority, waiting time for primary users must equal waiting time for the corresponding one class model. Because the waiting times for primary users are completely unaffected by the
  • 5. Int J Elec& Comp Eng ISSN: 2088-8708  Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks (S. E. Saad) 5173 presence of users in the secondary classes, waiting time will be the same for any other values of arrival rates , including λsi = 0. The waiting time for primary user can be formulated from Equations (3), (4), and (5): Wp = 1 [ c! (cμ− λ) ( λ μ )c ∑ ( λ μ )n n! + c μ] [1 − λp c μ ]c−1 n=0 + 1 μ (6) Waiting time for secondary user can be calculated by an iterative procedure. Class one secondary user is completely unaffected by lower-priority classes, which can therefore be ignored in the analysis. Let WX1 be the expected waiting time in the system of a random arrival in either of these primary users and class one secondary users: Wx1 = 1 [ c! (cμ− λx1) ( λx1 μ )c ∑ ( λx1 μ )n n! + c μ] [1 − λx1 c μ ]c−1 n=0 + 1 μ (7) λx1 = λp + λs1 (8) So the probability is that this arrival is primary user λp λp+ λs1 and λs1 λp+ λs1 , that it is in class one secondary user. Therefore, Wx1 = λp λp+ λs1 Wp + λs1 λp+ λs1 Ws1 (9) Ws1 = λp + λs1 λs1 Wx1 − λp λs1 Wp (10) For class two secondary user: Let WX2 be the expected waiting time in the system of a random arrival in either of these primary users, class one secondary users, and class two secondary users: Wx2 = 1 [ c! (cμ− λx2) ( λx2 μ )c ∑ ( λx2 μ )n n! + c μ] [1 − λx2 c μ ]c−1 n=0 + 1 μ (11) λx2 = λp + λs1 + λs2 (12) Wx2 = λp λp + λs1 + λs2 Wp + λs1 λp + λs1 + λs2 Ws1 + λs2 λp + λs1 + λs2 Ws2 (13) Ws2 = λp + λs1 + λs2 λs2 Wx2 − λs1 λs2 Ws1 − λp λs2 Wp (14) The waiting time for class three can be derived with the same procedures, and the other three parameters can be easily formulated by using equations (4), and (5). 3. SIMULATION RESULTS This section evaluates the proposed model using MATLAB. Results have been carried out by varying the arrival rate of the primary users. The proposed model has been evaluated by four metrics namely, expected waiting time in queue, expected number of users in queue, expected waiting time in the system, and expected number of users in the system. Results have been obtained in the case of five channels. 3.1. Comparison between The Proposed Model and The Basic Model Queue in [15] Authors in [15] provide the description and comparison of 13 structured and simulation modeling systems (SSMS). Structural and simulation modeling systems are compared to each other. Structural model simulated in [15] proposed queuing model without priority. In this subsection, results obtained from the proposed model will be compared with the results in [15]. The parameters used in this simulation are the same as the parameters used in [15].
  • 6.  ISSN:2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5169 - 5177 5174 Table 2. Comparison of the Proposed Model with the Basic Model in [15] Parameter Proposed Model Results of [15]PU SU1 SU2 SU3 Total Network Lq 0.0001939 0.0084 0.0657 0.2799 0.3541939 0.354 L 0.7502 0.7584 0.8157 1.0299 3.3542 3.354 Wq 0.0077572 0.3374869 2.6267 11.197 3.542236 3.542 W 30.008 30.337 32.627 41.197 33.54225 33.542 As shown in Table 2, total results obtained from the proposed model are the same as the results in [15]. All measured time values in unit time. This simulation has been performed to prove that, the proposed model is validated by comparing the total results achieved with the results of the conventional model. In I. Yakimov et al a conventional queuing model without priority was presented, which does not meet the requirements for cognitive radio networks [15]. This paper proposes a model for multi-channel, multi-classes cognitive radio networks using the preemptive priority model based on queuing theory. A performance analysis in the most general form can be conducted by the proposed model. In the next subsection, the proposed model will be analyzed to ensure priority for primary users and ensure priority for higher class secondary user over lower class at a different arrival rate. 3.2. Performance Evaluation of the Proposed Model at Different Request Rate In this simulation, the arrival rate of the primary users may vary between 0.01-4 request/sec. In this analysis, the arrival rate of the seconddary users is 4 request/sec for each class, and the service rate is 4 request/sec for each channel. Figure 3. Expected Waiting Time in the Queue Figure 4. Expected Waiting Time in the System The performance in terms of waiting time in buffer is shown in Figure 3. It can be observed that, the waiting time in buffer for primary user is the lowest in the system. Results show that, at the point of λp = 4, λs1 = λs2 = λs3 = 4 request/sec; Waiting time for primary and three classes of secondary user is 0.24 ms, 9.7 ms, 78.6 ms, and 465.6 ms respectively. We can examine the effect of priority schedule at this point. The waiting time in the queue without priority is 138.5 ms, so, the priority schedule improves the waiting time in queue for class one secondary users, and class two secondary users by 92.99%, and 43.25% respectively compared to the basic model without priority. It is important to note that, the average of waiting time for all users of the proposed model at any point is exactly equal to the waiting time in the queue without priority First Come First Serve (FCFS) discipline at the same point, so, the average of waiting time for all users at the point λp = 4, λs1 = λs2 = λs3 = 4 request/sec is 138.5 ms. It is observed that the waiting time in queue increases in an exponential order as the arrival rate of primary users increased.
  • 7. Int J Elec& Comp Eng ISSN: 2088-8708  Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks (S. E. Saad) 5175 Figure 4 shows that, at the point of λp = 4 request/sec; waiting time for primary and three classes of secondary user is 250.24 ms,259.7 ms, 328.6 ms, and 715.6 ms respectively. To study the impact of priorities, the waiting time in the system without priority is 388.5 ms so, the priority schedule improves the waiting time in class one secondary users, and class two secondary users by 33.15%, and 15.42% respectively. As the primary user arrival rate increases, then due to high priority, the primary user takes the channel from secondary user and the secondary user will be ejected to waiting buffer. Further, as the primary users use more channels in the system, then the waiting time to the secondary users should increase as depicted in Figures 3 and 4. Then, if there isn't an empty channel for secondary user and there is lower priority secondary user in service so; the lower priority secondary user will be ejected to waiting buffer and the higher priority secondary user will be accessed. Consequently, the lower priority secondary user will be more affected by increasing the primary user arrival rate. Figure 5. Expected Number of Users in Waiting Figure 6. Expected Number of Users in System As shown in Figure 5, the number of users in the waiting buffer for primary users is lower than others users. Results show that, at the point of λp = 4request/sec; number of users in the waiting buffer for primary and three classes of secondary user is 0.00096, 0.0388, 0.3144, and 1.86 respectively. To study the impact of priorities, the waiting time in the system without priority is 2.22 so; the priority schedule improves the waiting time in class one secondary users, and class two secondary users by 93%, and 43.35% respectively. Figure 6 shows that, the number of users in the system for primary users are lower than others users. Results show that, at the point λp = 4request/sec; number of users in the system for primary and three classes of secondary user is 1.001, 1.0388, 1.3144, and 2.8622 respectively. To study the impact of priorities, the number of users in the system without priority is 6.22 so; the priority schedule improves the number of users in the system in class one secondary users, and class two secondary users by 33.2%, and 15.47% respectively. From the performance analysis results, it is concluded that, at the arrival rate of the primary user increases, the waiting time and the number of users increase, but the priority of each class is reserved. The waiting time for primary users are completely unaffected by the presence of users in the secondary classes. In most previous studies, the authors consider that the secondary user is a single class. This consideration does not meet the needs of multiple applications for the use of cognitive radio. Therefore, the model presented in this paper is a solution to this problem. Compared with the previous works [8- 10, 12], the authors have assumed the cognitive radio networks by assuming the problem as a single channel. However, these models do not adequately overcome the need to analyze of cognitive radio networks as they have multiple channels. Therefore, the model presented in this paper can be efficiently used to analyze the behavior of multi-channel of the priority queue model for cognitive radio networks.
  • 8.  ISSN:2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5169 - 5177 5176 4. CONCLUSION In this paper, priority based preemptive queuing model has been proposed for channel access in cognitive radio networks. Steady state analysis of the proposed model is presented. Preemption priority is utilized to meet requirements of the class one and class two secondary users. The proposed model gives the commendable schedules of primary and secondary users.This work can be extended to evaluate a preemptive priority discipline in event simulator, and can be extended to analyze the performance in the case of finite size of waiting buffer. REFERENCES [1] O.W. Bello, O.A. Sowande, S.O. Onidare, M.Y. Muhammada, and A.A. Ayeni, “Large scale spectrum survey in rural and urban environments within the 50 MHz–6 GHz bands”, Elsevier, Measurement Journal 91, 2016. [2] F.Z. El Bahi, H. Ghennioui, and M. Zouak, ” Performance Evaluation of Energy Detector Based Spectrum Sensing for Cognitive Radio using NI USRP-2930”, International Journal of Electrical and Computer Engineering (IJECE), vol. 7, no. 4, pp. 1934 – 1940, 2017. [3] A.S. Khobragade1, and R. D. Raut, ” Hybrid Spectrum Sensing Method for Cognitive Radio”, International Journal of Electrical and Computer Engineering (IJECE), vol. 7, no.5, pp. 2683 – 2695, 2017. [4] Mohammadreza Amini, Asra Mirzavandi, Mosrafa Rezaei, “Discrete Markov Chain Based Spectrum Sensing for Cognitive Radio”, International Journal of Electrical and Computer Engineering (IJECE), vol. 5, no. 2, pp. 297 – 30, 2015. [5] S.S. Ali, C. Liu, and M. Jin, “Minimum Eigenvalue Detection for Spectrum Sensing in Cognitive Radio”, International Journal of Electrical and Computer Engineering (IJECE), vol. 4, no. 4, p. 623, 2014. [6] H. Sun, A. Nallanathan, C.X. Wang, and Y. Chen, “Wideband spectrum sensing for cognitive radio networks: a survey”, IEEE Wirel. Commun., vol. 20, no. 2, pp. 7481, 2013. [7] J. Avila, and K. Thenmozhi, “Multiband OFDM for Cognitive Radio – A Way for Cyclostationary Detection and Interference Cancellation”, International Journal of Electrical and Computer Engineering (IJECE), vol. 6, no. 4, pp. 1702 – 1709, 2016. [8] L. Chen, L. Huang, H. Xu, and J. Hu, “Queueing Analysis for Preemptive Transmission in Underlay Cognitive Radio Networks”, International Journal of Communication Systems, 29: 1138–1155. doi: 10.1002., John Wiley & Sons, Ltd, 2016. [9] M.E. Bayrakdar, and, A. Çalhan, “Improving spectrum handoff utilization for prioritized cognitive radio users by exploiting channel bonding with starvation mitigation”, Elsevier, International Journal of Electronics and Communications (AEÜ), 2017. [10] M.E. Bayrakdar, and, A. Çalhan, “Non-Preemptive Queueing Model of Spectrum Handoff Scheme based on Prioritized Data Traffic in Cognitive Wireless Networks”, ETRI Journal, 39 (4), 558-569, 2017. [11] T.C. Chu, H. Phan, and H. Zepernick, “Dynamic Spectrum Access for Cognitive Radio NetworksWith Prioritized Traffics”, IEEE communications letters, Vol. 18, NO. 7, 2014. [12] V. Kumar, S. Minz , and Vipin Kumar, “Performance analysis of cognitive radio networks under spectrum sharing using queuing approach”, Elsevier, Computers and Electrical Engineering 52, 2016. [13] Navid Tadayon, “Modeling, Design and Analysis of Multi-Channel Cognitive Radio Networks”, PHD Thesis, 2016. [14] P. Kandasamy, K. Thilagavathi, and K. Gunavathi, “Probability statistics and Queuing theory”, S. Chand &Company LTD., New Delhi, 2006. [15] I. Yakimov, A. Kirpichnikov, V. Mokshin, Z. Yakhina, and R. Gainullin, “The Comparison of Structured Modeling and Simulation Modeling of Queueing Systems”, 16th International Conference, Information Technologies and Mathematical Modelling (ITMM), Queueing Theory and Applications, Springer, 2017.
  • 9. Int J Elec& Comp Eng ISSN: 2088-8708  Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks (S. E. Saad) 5177 BIOGRAPHIES OF AUTHORS Saad Elsayed is an Assistant Lecturer in the High Institute for Engineering and Technology, Al- Obour, Cairo, Egypt. He received his BSc and MSc in Electronics and Communications Engineering from the Faculty of Engineering, Al-Azhar University, Cairo, Egypt, in 2008 and 2015 respectively. He is currently a PhD student at Faculty of Engineering, Al-Azhar university, Cairo. His research activities are within wireless communications and communication networks. Ibrahim Fathy Tarrad received his BSc and MSc degrees in Electronics and Communications Engineering from the Faculty of Engineering, Al-Azhar University, Cairo, Egypt, in 1984 and 1989, respectively. He received his PhD from the Technical University of Budapest in 1996. In 1996, he was appointed Lecturer at the Department of Electronics and Communications Engineering, Al-Azhar University. In 2015, he became an Associate Professor in Communications Engineering at the Faculty of Engineering, Al-Azhar University. His research activities are within wireless communications and digital communications. Abdelhady Abdelazim Ammar is a professor in Electronics and Communications Engineering department, Faculty of Engineering, Al-Azhar University, Cairo, Egypt since 1988. His research activities are within digital communications, mobile communications and digital signal processing.