In this study, we will be developed new framework-based deep learning techniques for IDS detection in a wireless sensor network. This study uses three methods for developing …
EF Khairullah, M Chatterjee - Pervasive and Mobile Computing, 2018 - Elsevier
One of the ways to harness the radio bands that are not used by their primary owners, is to allow opportunistic use of the bands by secondary users (SUs) such that they do not …
A model based on the combination of spectrum access techniques (underlay, overlay, and interweave) with an ant lion optimization strategy was developed in this study. This supports …
EF Khairullah, M Chatterjee… - 2017 IEEE 18th …, 2017 - ieeexplore.ieee.org
In this paper, we propose an opportunistic scheduling algorithm for secondary users (SUs) in a dynamic spectrum access network. Scheduling is performed at the beginning of each …
The paradigm shift from static spectrum allocation to a dynamic one has opened many challenges that need to be addressed for the true vision of Dynamic Spectrum Access (DSA) …