Cognitive detection exploiting the relation among primary user's states

Shengliang Peng, Xi Yang, Shuli Shu, Xiuying Cao

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In cognitive radio where continuous spectrum monitor is required, primary user detections should be performed successively. As the primary user usually keeps absent/present for some time, its states (absence or presence) at successive detections are not independent with each other. In this paper, a novel detection scheme is proposed to exploit the relation among them. At the beginning of each detection, this scheme exploits the relation by deriving instantaneous a priori probabilities from previous detections' results. Then using these probabilities, Bayesian cost of both false alarm and missed detection is minimized. Simulation results are also provided in this paper, showing that the proposed scheme is not only better than classical energy detection scheme, but also superior to the Bayesian energy detection scheme that does not exploit the relation and minimizes Bayesian cost only with average a priori probabilities.

Original languageEnglish
Title of host publicationProceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009
DOIs
StatePublished - 2009
Externally publishedYes
Event5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009 - Beijing, China
Duration: 24 Sep 200926 Sep 2009

Publication series

NameProceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009

Conference

Conference5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009
Country/TerritoryChina
CityBeijing
Period24/09/0926/09/09

Keywords

  • Bayesian cost
  • Cognitive detection
  • Instantaneous a priori probabilities
  • Relation

Fingerprint

Dive into the research topics of 'Cognitive detection exploiting the relation among primary user's states'. Together they form a unique fingerprint.

Cite this