Achievable transmission rate of the secondary user in cognitive radio networks with hybrid spectrum access strategy

X Tan, H Zhang, J Hu - IEEE communications letters, 2013 - ieeexplore.ieee.org
A hybrid spectrum access strategy which is different from traditional underlay or overlay
strategy is proposed for cognitive radio networks. In proposed strategy, the secondary users …

Effective capacity analysis over generalized lognormal shadowed composite fading channels

P Yadav, R Kumar, S Kumar - Internet Technology Letters, 2020 - Wiley Online Library
In this paper, a novel closed form expression for the effective capacity (EC) over the α‐η‐
μ/Lognormal and α‐κ‐μ/Lognormal composite fading channels has been derived. Using the …

Effective capacity of communication systems over κμ shadowed fading channels

J Zhang, L Dai, WH Gerstacker, Z Wang - Electronics Letters, 2015 - Wiley Online Library
The effective capacity of communication systems over generalised κ–μ shadowed fading
channels is investigated. A novel and analytical expression for the exact effective capacity is …

Covert Communication in Cognitive Radio Networks with Poisson Distributed Jammers

J Hu, H Li, Y Chen, F Shu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This work proposes a covert communication scheme in a cognitive radio network where a
secondary transmitter (ST) transmits confidential information to a secondary receiver under …

BER performance of full-duplex cognitive radio network with nonlinear energy harvesting

M Babaei, Ü Aygölü, M Başaran… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, the bit error rate (BER) performance of a full-duplex (FD) overlay cognitive
radio (CR) network with linear/nonlinear energy harvesting (EH) capability is investigated …

Analysis of area data rate with shadowing effects in Li-Fi and RF hybrid network

Y Wang, X Wu, H Haas - 2016 IEEE international conference on …, 2016 - ieeexplore.ieee.org
Light Fidelity (LiFi) uses light emitting diodes (LEDs) for high speed wireless
communications. Since employing a different range of the electromagnetic spectrum from …

Primary secrecy is achievable: Optimal secrecy rate in overlay crns with an energy harvesting secondary transmitter

L Chen, L Huang, H Xu, C Yang… - … and Networks (ICCCN …, 2015 - ieeexplore.ieee.org
To tackle the challenging secrecy communication problem in energy harvesting cognitive
radio networks, this paper considers an overlay system with one energy harvesting …

[HTML][HTML] Robust beamforming for IRS-aided SWIPT in cognitive radio networks

Z Wang, M Lin, S Huang, M Cheng, WP Zhu… - Digital Communications …, 2023 - Elsevier
Intelligent reflecting surface (IRS) is widely recognized as a promising technique to enhance
the system performance, and thus is a hot research topic in future wireless communications …

Secrecy analysis for energy harvesting-enabled cognitive radio networks in cascaded fading channels

DH Tashman, W Hamouda - ICC 2021-IEEE International …, 2021 - ieeexplore.ieee.org
Physical-layer security (PLS) for an underlay cognitive radio network (CRN)-based
simultaneous wireless information and power transfer (SWIPT) over cascaded κ-µ fading …

The cumulative distribution function for the joint fading and two path shadowing channel: Expression and application

I Dey, GG Messier… - 2014 IEEE 80th Vehicular …, 2014 - ieeexplore.ieee.org
A new expression for the Cumulative Distribution Function (CDF) of the Joint Fading and
Two-path Shadowing (JFTS) distribution is derived in this paper. The derived theoretical …