SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 4, August 2020, pp. 3854∼3861
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i4.pp3854-3861 Ì 3854
Dynamic resource allocation for opportunistic
software-defined IoT networks: stochastic optimization
framework
Sharhabeel H. Alnabelsi1
, Haythem A. Bany Salameh2
, Zaid M. Albataineh3
1
Computer Eng. Dept., Faculty of Eng. Technology, Al-Balqa Applied University, Jordan
1,2
College of Engineering, AL Ain University, AL Ain, United Arab Emirates
2,3
Telecommunications Eng. Dept., Yarmouk University, Jordan
Article Info
Article history:
Received Nov 9, 2019
Revised Feb 11, 2020
Accepted Feb 21, 2020
Keywords:
Cognitive radio networks
Internet of things
Primary users
Secondary users
Stochastic optimization
ABSTRACT
Several wireless technologies have recently emerged to enable efficient and scalable
Internet-of-Things (IoT) networking. Cognitive radio (CR) technology, enabled by
software-defined radios, is considered one of the main IoT-enabling technologies that
can provide opportunistic wireless access to a large number of connected IoT devices.
An important challenge in this domain is how to dynamically enable IoT transmis-
sions while achieving efficient spectrum usage with a minimum total power consump-
tion under interference and traffic demand uncertainty. Toward this end, we propose
a dynamic bandwidth/channel/power allocation algorithm that aims at maximizing the
overall network’s throughput while selecting the set of power resulting in the minimum
total transmission power. This problem can be formulated as a two-stage binary linear
stochastic programming. Because the interference over different channels is a contin-
uous random variable and noting that the interference statistics are highly correlated,
a suboptimal sampling solution is proposed. Our proposed algorithm is an adaptive
algorithm that is to be periodically conducted over time to consider the changes of
the channel and interference conditions. Numerical results indicate that our proposed
algorithm significantly increases the number of simultaneous IoT transmissions com-
pared to a typical algorithm, and hence, the achieved throughput is improved.
Copyright c 2020 Insitute of Advanced Engineeering and Science.
All rights reserved.
Corresponding Author:
Sharhabeel H. Alnabelsi,
Computer Engineering Dept.,
Al-Balqa Applied University,
P.O. Box: 15008, Amman 11134, Jordan.
Email: alnabsh1@bau.edu.jo
1. INTRODUCTION
With the exponential growth of Internet-of-things (IoT) applications and services, it is expected that
more than 50 billion devices will be connected to the internet by 2020. IoT networking connects varied wired
and wireless devices and systems. The enormous number of connected wireless IoT devices significantly
increases the demand for more spectrum resources and efficient spectrum utilization. Software-defined net-
working enabled by cognitive radio (CR) technology is considered as a major approach to improve spectrum
utilization and provide wireless access to a large number of connected IoT devices. Wireless CR technology
allows for rapid deployment of scalable, reliable and intelligent IoT networking. CR technology brings intel-
ligence right to the edge of an IoT network. The intelligent offered by the CR at the edge nodes provides a
complete connectivity stack virtually between any type of wireless sensors and an IoT controller.
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 3855
(a) Motivation
Due to the fact that the demand in the IoT services and applications is exponentially increasing, CR
technology allows to use underutilized spectrum using dynamic spectrum access technique. In a CR network
(CRN), CR users, also known as secondary or unlicensed users, are aware about licensed spectrum that used by
existing Primary User (PU) networks. CR users can opportunistically access the licensed spectrum by chang-
ing their transmission parameters, in order to avoid affecting ongoing PUs’ transmission. This has motivated
the need for a new spectrum access technology that introduced in CRNs, such that the spectrum utilization is
enhanced without affecting the PUs operation. A CRN is different from the traditional multi-channel wire-
less networks. Most importantly, CRN experience out-of-system and in-system random interference. Another
characteristic of a CRN is that users may need to transmit with a relatively low signal power, with power
masks constraints, in order to avoid causing harmful interference to the PUs [1]. On the other hand, the appli-
cations supported by the IoT devices are very diverse, requiring heterogeneous uncertain bandwidth and rate
demands. When applying CR technology in IoT networks (CRIoT networks), these peculiar characteristics call
for new stochastic channel access mechanism that can efficiently utilize the available spectrum to maximize the
number of simultaneous CRIoT transmissions with minimum total transmission power, and improved network
throughput[2–9].
(b) Contributions
Previous channel assignment approaches in traditional multi-channel and CR wireless networks were
designed assuming average interference conditions, fixed channel bandwidth and fixed spectrum demands per
user. In this work, we propose a stochastic bandwidth/channel/power allocation algorithm that improves the
network performance. The maximization problem can be established as a two-stage stochastic binary linear
program. It is worth mentioning that the interference is a continuous random variable that is highly-correlated
over time [1, 10–15]. Thus, our optimization problem has an infinite realizations. Therefore, solving for an op-
timal solution is impossible. Instead, we propose a suboptimal sampling solution that exploits the interference’s
correlation.
(c) Organization
The rest of this paper is organized as follows: Section 2 presents the related work. In Section 3, the
problem model, description and formulation are introduced. Section 4 explains the process of channels assign-
ment and bandwidth allocation in the access window. Section 5 shows the numerical results for the performance
of our proposed scheme compared with traditional approaches. Finally, Section 6 presents conclusions.
2. RELATED WORK
Channels assignment in CRNs is different from the traditional networks, due to the fact that channels
availability changes over time due to licensed users activities. Moreover, CR users are power constrained, such
that their transmission power should not exceed a certain limit to avoid causing harmful interference to licensed
users. Consequently, satisfying CR users data rate demand becomes challenging. Therefore, we are motivated
in this work to consider these factors for our proposed adaptive channels assignment technique.
For concurrent channels assignment, in [16] authors proposed a scheme that allows a group of CR
users to be assigned channels instead of one user at a time, also they assumed channels do not have a fixed
bandwidth as a practical assumption, therefore, network throughput is increased. In [16, 17], a guard band
notion is introduced between idle channel blocks, in order to minimize the effect of adjacent interference and
maximize spectrum efficiency, such that in [17], the number of required guard bands are reduced when grouping
idle channels as one block.
Two channels assignment methods are developed in [18], in order to maximize spectrum efficiency:
the static single-stage method when a centralized spectrum manager does not exist, the second method is an
adaptive two-stage technique which is suitable for centralized spectrum manager. In addition to the uncertainty
of the channels, the authors also consider two aspects in their models: the fact of adjacent channels interference
and channels bonding and aggregation. In addition to many proposed protocols in literature that aim to enhance
network capacity, throughput and optimize transmitted power [1, 19, 20]. Fair channels assignment and energy
optimization are considered in [21].
CR users transmission power should be controlled, in order to avoid interference with neighbor li-
censed users transmission [22]. For CR Ad-Hoc Networks (CRAHNs) [23], transmission power control and
spectrum assignment methods are developed to enhance network capacity. Spectrum assignment method is
Dynamic resource allocation for opportunistic... (Sharhabeel H. Alnabelsi)
3856 Ì ISSN: 2088-8708
presented in [24] and solved using a learning technique, also an adaptive power allocation method is solved
as an optimization problem. The harmful interference reduction to licensed users is studied in [25], also using
the deep-reinforcement learning technique [26], mobile CR users empowered to change their physical location
when jamming is high. Researchers have studied network connectivity in CRNs, especially, it is essential in
routing stability. Noting that its connectivity is different from traditional networks, since the licensed spectrum
availability changes over time. In [27], links are established in a way that minimizes interference and enhance
connectivity degree. Also, authors in [28] proposed some CR transceivers to be maintain the lowest threshold
for connectivity. For routing protection in terms of connectivity, a resilient method is introduced in [29–31].
Also, CR users packets recovery due to primary users activity is studied in [32].
3. MODELS, PROBLEM DESCRIPTION AND FORMULATIONS
3.1. Network model
In this work, we will consider the scenario of a single-hop opportunistic wireless cognitive (unli-
censed) radio network (CRN) that tries to exploit spectrum holes in the presence of different (legacy) primary
radio networks with channels. CR user acts as a secondary user by continuously scanning the frequency spec-
trum and identifying underutilized channels to exploit opportunistic access.
The CRN comprises a collection of single-hop users between which requests for packet transmission
arise. Each CR user can transmit over one of the M available channels. This can be seen as M possible
links. Due to the nature of wireless CRNs, a channel (link), which is occupied by a CR user, cannot be
allocated to other CR users in its one-hop communication range. Furthermore, each channel link experiences
a random primary network interference conditions, and each CR user has a random demand data rate. To
satisfy a given demand, a bandwidth must be allocated for each channel. Because of the radio capability
restrictions, the maximum bandwidth (B) that can be used over the various channels is constrained. Therefore,
the optimization problem is to determine channel bandwidths that maximizing the over all network throughput
(bandwidth utilization) while selecting the set of power resulting in the minimum total transmission power.
This problem lends itself to a natural two-stage stochastic integer linear programming. That is, the maximum
bandwidth, which can be used by CRN, must be allocated to the various channels before the rate demand and
the interference conditions can be known. Once B has been allocated to different channels, CR requests can be
served in a manner that allows efficient spectrum use with minimum total power consumption. The optimization
of bandwidth/channel/power is an adaptive algorithm that is to be periodically conducted over time to account
for the changes for the channel and the primary network interference conditions. The distributions of the
rate demands and the interference power are dynamically updated based on localized spectrum and control
information observed over the previous transmissions time.
3.2. Assumptions and feasibility conditions
Before formulating our optimization problem, we first state our assumptions and feasibility conditions.
(a) There are two sets: i ∈ I: channels, and j ∈ J: CR users.
(b) The rate demand dj is a discrete uniform random variables, ∀j ∈ J.
(c) Each CR user maintains an K-entry historical-data table. The ith entry in the table consists of one fields
indicating the previously observed interference over the ith access window (AW) time.
(d) The rate demand (dj) and the interference (P
(i)
I , ∀i ∈ I) are independent random variables.
(e) The interference (P
(i)
I , ∀i ∈ I) is a continuous positive random variable with unknown distribution.
(f) The interference at different channels is independent and identically distributed (iid).
To ensure a feasible spectrum sharing, we introduce these constraints:
(a) At most one channel can be assigned for one transmission.
(b) A channel cannot be assigned for more than one transmission.
(c) Rate demand constraint: the data rate provided by a channel should be greater than the rate demand of
the request that associated with that channel.
(d) The CR-to-PU spectrum mask: the maximum allowable transmission power of CR users must be con-
strained by a power mask, such that the CR users will not cause unacceptable interference to primary
users.
(e) The signal to interference noise ratio (SINR) at a CR user should be greater than the minimum required
threshold at the selected channel.
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 3854 – 3861
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 3857
3.3. Problem formulation
The problem of bandwidth/channel/power allocation can be formulated as a two-stage stochastic pro-
gramming. In the first stage, the maximum bandwidth, which can be used by CRN, is allocated to the various
channels before the rate demand and the interference conditions can be known. Then, in the second stage, we
allocate/select channels/powers to different CR users such as the total power consumption is minimized.
To formulate the problem, we introduce the indices, data, random variables, and decision variables:
(a) Sets (indices): i ∈ I: channels, and j ∈ J: CR users.
(b) Data: B is the total bandwidth that can be allocated to the various channels, M is the number of channels
that are to be considered, N is the total number of users, P
(i)
th is the thermal noise power at the ith
channel, and µ∗
is the minimum required signal-to-Interference-and-noise-ratio.
(c) Random variables: ξ = (dj, P
(i)
I ): the random variables that represent the demand and the interference
at various channels and different users.
(d) Random Data: P
(i)
j = µ∗
(P
(i)
th + P
(i)
I ): the required transmit power over the ith channel for the jth user
over the various channels.
(e) Decision variables: Xi: is the amount of capacity to be assigned to the ith channel. α
(i)
j : is channel
assignment indicator that is given by:
α
(i)
j =
1, if channel j is assigned to the ith transmission;
0, otherwise.
(1)
With these notations, the general-recourse model for bandwidth/channel/power problem is given as:
max
Xi
E[h(X, ξ)]
M
i=1
Xi ≤ B
Xi ≥ 0 i ∈ I (2)
where h(X, ξ) represents the channel utilization when the demand for service and the interference are given.
This function is represented by the optimal value function of a second-stage program. Based on the above
notation, the second stage problem can be formulated as follows:
max
M
i=1
N
j=1 α
(i)
j −
M
i=1
N
j=1 α
(i)
j P
(i)
j
j α
(i)
j ≤ 1, i ∈ I
i α
(i)
j ≤ 1, j ∈ J
i j α
(i)
j ≤ M
α
(i)
j ∈ {0, 1}, i ∈ I, j ∈ J
Xi log2 1 +
P
(i)
j
P
(i)
I +P
(i)
th
− dj ≥ (α
(i)
j − 1)θ, i ∈ I, j ∈ J
(3)
where θ is a very large number. Clearly, the formulation in (3) is a two-stage stochastic binary linear program.
3.4. Suboptimal sampling problem formulation
Since the interference over different channels is a continuous random variable, the problem instance
as described above has an infinite number of scenarios. Therefore, a solution with a deterministic equivalent
is not possible. However, by noting that, the interference conditions measured at a certain channel are highly
correlated. Thus, the K most recent observed interference scenarios are considered to find a suboptimal solu-
tion. To account for the dynamic (random) changes in the interference conditions, our optimization program is
an adaptive algorithm that is to be periodically conducted over time (Access window). Now, given the K-entry
interference table and considering the constrained listed above, the deterministic equivalent for one scenario ω
(ω is one realization) can be formulated as follows:
Dynamic resource allocation for opportunistic... (Sharhabeel H. Alnabelsi)
3858 Ì ISSN: 2088-8708
(4)
max
M
i=1
N
j=1
α
(i)
j
ω
−
M
i=1
N
j=1
α
(i)
j
ω
P
(i)
j
ω
s.t.
M
i=1
Xi ≤ B
j
α
(i)
j
ω
≤ 1, i ∈ I
i
α
(i)
j
ω
≤ 1, j ∈ J
i j
α
(i)
j
ω
≤ M
α
(i)
j
ω
∈ {0, 1}, i ∈ I, j ∈ J
Xi log2 1 +
P
(i)
j
ω
P
(i)
I
ω
+ P
(i)
th
− dω
j ≥ (α
(i)
j − 1)θ, ∀i ∈ I, ∀j ∈ J
Xi ≥ 0, i ∈ I (5)
4. HISTORICAL SAMPLING/ ACCESS WINDOW
At the beginning of an AW and given the interference or demand conditions over the previous AW,
the maximum bandwidth, which can be used by CRN, is allocated to the various channels, this conducted in
the first stage. This can be achieved by solving the deterministic equivalent for the K-historical samples. In
the second stage, where the interference and rate demands are realized, we allocate/select channels/powers
to different CR users such as the total power consumption is minimized. During the current AW time, the
interference conditions and rate demands are recorded. Then the above process is repeated over and over for
every AW time. To illustrate this mechanism, we consider a CRN scenario as shown in Figure 1, where 6 CR
pairs content to access 3 different channels. Figure 2 shows the associated timing diagram for decisions or
stages of our optimization problem.
1
2
3
4
5
6
Figure 1. Cognitive radios links
Update Bandwidth
Allocation
(1st Stage)
Update Bandwidth
Allocation
(1st Stage)
Multiple Channel
Assignment
(2nd Stage)
Multiple Channel
Assignment
(2nd Stage)
t
Figure 2. Optimization timing diagram
5. NUMERICAL RESULTS
We illustrate the previously discussed optimization process with a numerical example. We compare
the performance of our proposed scheme to that of traditional schemes such as the static allocation [1], weighted
average schemes [10] and optimal solution. The static assignment is based on providing a fixed-bandwidth per
channel irrespective of the user’s demand. The weighted average attempt at providing variable bandwidth
depends on the average users’ demand, rather than the actual demand. The optimal solution is found using a
brute-force method that requires an exhaustive search over a large state space that increases exponentially with
number of channel and number of CR users. We consider 3 primary users networks (M = 3) and 4 CRN links.
Suppose that the AW consists of 4 periods, K = 4. We set µ∗
= 3, P
(i)
th = 0.001, ∀i, and B = 30 Mbps.
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 3854 – 3861
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 3859
At a beginning of an AW, assume that the recorded interference
−→
P
(i)
I : i = 1, 2, 3 and the rate demand
dj : j = 1, 2, 3 are given by:
P
(1)
I = {0.25, 0.1, 0.15, 0.25}, and dj = {5, 10, 11, 12}.
P
(2)
I = {0.5, 0.45, 0.35, 0.35}, and dj = {5, 6, 8, 7}.
P
(3)
I = {0.3, 0.2, 0.15, 0.15}, and dj = {10, 10, 10, 10}.
Also assume that the interference over the next AW is given by:
P
(1)
I = {0.3, 0.15, 0.2, 0.29}, and dj = {8, 7, 5, 10}.
P
(2)
I = {0.48, 0.46, 0.33, 0.31}, and dj = {6, 8, 5, 5}.
P
(3)
I = {0.27, 0.24, 0.11, 0.25}, and dj = {7, 5, 10, 8}.
The reported results are averaged over 100 experiments. Figure 3 shows the details of the two stages
of the proposed channel optimization process. The outcome of this process is shown in Figure 4. This figure
shows that our stochastic scheme significantly improves network throughput. This improvement is attributed
to the the proper bandwidth/channel assignment algorithm.
Allocate bandwidth for
channels 1, 2, and 3
Assign channels to CR
users 1, 2, and 3
Figure 3. Example that illustrates the optimization
process in a dynamic CRN.
0
1
2
3
4
5
6
7
8
9
10
11
12
1 2 3
Throughput(packets/AW)
Time in terms of AW
Static Allocation
Weighted Average
Stochastic Scheme
Optimal Bound
Figure 4. Comparison of different allocation schemes.
6. CONCLUSIONS
In this paper, we propose a novel stochastic bandwidth/channel/power allocation. Our proposed
scheme maximizes the CRN throughput through a proper bandwidth/channel allocation process while in the
same time minimizes the total power consumption. We proposed a two-stage stochastic bandwidth and channel
assignment scheme that dynamically exploits the correlation between the interference conditions and the rate
demands to maximize the overall network throughput. Compared to traditional bandwidth/channel allocation
schemes, numerical results showed that our proposed scheme reveals significant performance improvement in
the overall achieved network throughput.
REFERENCES
[1] H. Bany Salameh, M. Krunz, O. Younis, “Cooperative adaptive spectrum sharing in cognitive radio net-
works,” IEEE/ACM Trans. on Networking(TON), vol.18, no.4, pp. 1181-1194, 2010.
[2] M. Bani Hani, H. Bany Salameh, Y. Jararweh, and A. Bousselham, ”Traffic-aware self-coexistence man-
agement in IEEE 802.22 WRAN systems,” In 2013 7th IEEE GCC Conference and Exhibition, pp. 507-
510, 2013.
[3] A. Ranjan and G. Somani, ”Access control and authentication in the internet of things environment,”
Computer Communications and Networks, pp. 283-305, 2016.
[4] H. Al-Mahdi, F. Yasser, ”Design and analysis of routing protocol for cognitive radio ad hoc networks in
Heterogeneous Environment,” International Journal of Electrical and Computer Engineering (IJECE),
vol. 9, no. 1, pp. 341-351, 2019.
[5] A. Khan, M. Rehmani, and A. Rachedi, ”Cognitive-radio-based internet of things: Applications, architec-
tures, spectrum related functionalities, and future research directions”, IEEE Wireless Communications,
Vol. 24, No.3, pp. 17-25, 2017.
Dynamic resource allocation for opportunistic... (Sharhabeel H. Alnabelsi)
3860 Ì ISSN: 2088-8708
[6] H. Bany Salameh, S. Almajali, M. Ayyash, and H. Elgala, ”Security-aware channel assignment in IoT-
based cognitive radio networks for time-critical applications,” Fourth International Conference on Soft-
ware Defined Systems (SDS), pp. 43-47, Valencia, 2017.
[7] S. Razmi, N. Parhizgar, ”Adaptive resources assignment in OFDM-based cognitive radio systems,” Inter-
national Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 3, pp. 1935-1943, 2019.
[8] P. Varade, A. Wabale, R. Yerram, and R. Jaiswal, ”Throughput Maximization of Cognitive Radio Multi
Relay Network with Interference Management,” International Journal of Electrical and Computer Engi-
neering (IJECE), vol. 8, no. 4, pp. 2230-2238, 2018.
[9] S. Lakhal, Z. Guennoun, ”Equity-based free channels assignment for secondary users in a cognitive radio
network,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 3, pp. 2057-
2063, 2019.
[10] H. Bany Salameh, ”Efficient Resource Allocation for Multi-cell Heterogeneous Cognitive Networks With
Varying Spectrum Availability,” IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6628-
6635, 2016.
[11] H. Bany Salameh, H. Kasasbeh and B. Harb, ”A Batch-Based MAC Design With Simultaneous As-
signment Decisions for Improved Throughput in Guard-Band-Constrained Cognitive Networks,” IEEE
Transactions on Communications, vol. 64, no. 3, pp. 1143-1152, March 2016.
[12] A. Doulat, A. Al Abed Al Aziz, M. Al-Ayyoub, Y. Jararweh, H. Bany Salameh and A. A. Khreishah,
”Software defined framework for multi-cell Cognitive Radio Networks,” IEEE 10th International Con-
ference on Wireless and Mobile Computing, Networking and Communications (WiMob), Larnaca, pp.
513-518, 2014.
[13] H. Bany Salameh, O. Badarneh, ”Opportunistic medium access control for maximizing packet delivery
rate in dynamic access networks,” Journal of Network and Computer Applications, Volume 36, Issue 1,
pp. 523-532, 2013.
[14] M. Labib, S. Ha, W. Saad, and J. H. Reed, ”A colonel blotto game for anti-jamming in the internet of
things,” in the IEEE Global Communications Conference (GLOBECOM), pp. 1-6, Dec 2015.
[15] N. Namvar, W. Saad, N. Bahadori, and B. Kelley, ”Jamming in the internet of things: A game-theoretic
perspective,” in IEEE Global Communications Conference (GLOBECOM), Dec 2016, pp. 1-6.
[16] H. Bany Salameh, H. Kasasbeh and B. Harb, “An Opportunistic Guard-band-aware Channel Assignment:
A batch-based Approach”, Proc. of the IEEE WCNC’16 Conference, Qatar, pp. 1-6, April 2016.
[17] G. S. Uyanik, M. J. Abdel-Rahman, and M. Krunz, ”Optimal guardband-aware channel assignment with
bonding and aggregation in multi-channel systems,” in IEEE Proceedings of GLOBECOM Conference,
pp. 4769-4774, Dec. 2013.
[18] M. A. Rahman, M. Krunz, “Stochastic guard-band-aware channel assignment with bonding and aggrega-
tion for DSA networks,” IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 3888-3898, Jul. 2015.
[19] M. I. B. Shahid, J. Kamruzzaman, M. R. Hassan, “Modeling multi-user spectrum allocation for cognitive
radio networks,” Comput. Electr. Eng., vol. 52, pp. 266-283, May 2016.
[20] S. Qureshi, S. Ahmad, A. Ikram, N. Hasan. ”Joint energy and throughput based multi-channel assignment
in cognitive radio sensor network,” In 2016 IEEE 3rd International Symposium on Telecommunication
Technologies (ISTT), pp. 65-69, 2016.
[21] Z.-H. Wei and B.-J. Hu, ”A fair multi-channel assignment algorithm with practical implementation in
distributed cognitive radio networks,” IEEE Access, vol. 6, pp. 14255–14267, 2018.
[22] H. Bany Salameh, M. Krunz, D. Manzi, “Spectrum Bonding and Aggregation with Guard-band-awareness
in Cognitive Radio Networks,” IEEE Transaction on Mobile Computing, vol.13, no.3, pp.569-581, March
2014.
[23] J. Chen, S. Ping, J. Jia, Y. Deng, M. Dohler, and H. Aghvami, “Cross-layer optimization for spectrum
aggregation-based cognitive radio ad-hoc networks,” in Proc. IEEE GLOBECOM, pp. 1-6, Dec. 2017.
[24] M. Ghorbel, B. Hamdaoui, R. Hamdi, M. Guizani, and M. NoroozOliaee, “Distributed dynamic spec-
trum access with adaptive power allocation: Energy efficiency and cross layer awareness,” in Proc. IEEE
INFOCOM, pp. 694-699, Apr. 2014.
[25] L. Lei, and C. Chigan, ”A Virtual MIMO based anti-jamming strategy for cognitive radio networks,” In
2016 IEEE International Conference on Communications (ICC), pp. 1-6, 2016.
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 3854 – 3861
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 3861
[26] G. Han, L. Xiao, and H. Poor, ”Two-dimensional anti-jamming communication based on deep reinforce-
ment learning,” In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing
(ICASSP), pp. 2087-2091, 2017.
[27] A. Ralhan, R. Yadav, and R. Misra, ”Minimum Interference Topology Control in Cognitive Radio Net-
works through Channel Assignment,” In 2018 International Conference on Advances in Computing, Com-
munications and Informatics (ICACCI), pp. 1418-1423, 2018.
[28] R. Irwin, A. MacKenzie, L. DaSilva, ”Resource-minimized channel assignment for multi-transceiver cog-
nitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 3, pp. 442-450,
2013.
[29] P. Tseng, W. Chung, P. Hsiu, ”Minimum interference topology construction for robust multi-hop cognitive
radio networks,” In 2013 IEEE Wireless Communications and Networking Conference (WCNC), pp. 101-
105, 2013.
[30] S. H. Alnabelsi and A. E. Kamal, ”Resilient multicast routing in CRNs using a multilayer hyper-graph
approach,” IEEE International Conference on Communications (ICC), Budapest, pp. 2910-2915, 2013.
[31] S. H. Alnabelsi, ”Finding an Immuned Path against Single Primary User Activity in Cognitive Radio Net-
works,” International Journal on Communications Antenna and Propagation (IRECAP), Praise Worthy
Prize, Italy, 2017.
[32] S. H. Alnabelsi, and A. E. Kamal, ”Interference-based packet recovery for energy saving in Cognitive
Radio Networks,” IEEE International Conference on Communications (ICC), Ottawa, pp. 5978-5982,
2012.
BIOGRAPHIES OF AUTHORS
Dr. Sharhabeel H. Alnabelsi is an associate professor at Computer and Networks Eng. Dept. at
Al-Balqa Applied University, Jordan. He is also with the computer Eng. Dept. at Al Ain University,
UAE. He received his Ph.D. in computer engineering from Iowa State University, USA, 2012.
He received his M.Sc. in computer engineering from The University of Alabama in Huntsville,
USA, 2007. His research interests include Cognitive Radio Networks, Wireless Sensor Networks.
Email: alnabsh1@bau.edu.jo, sharhabeel.alnabelsi@aau.ac.ae
Prof. Haythem A. Bany Salameh is a Professor of Networks Communication Engineering with Al
Ain University, UAE. He received the Ph.D. degree in electrical and computer engineering from the
University of Arizona, USA, 2009. He is also in a sabbatical leave from Yarmouk University, Jordan.
In August 2009, he joined YU, after a brief postdoctoral position with the University of Arizona.
His research interests include optical communication technology and wireless networking. In the
summer of 2008, he was a member of the R&D Long-Term Evolution Development Group, QUAL-
COMM, Inc., San Diego, CA, USA. He is an IEEE Senior Member class of 2016.
Email: haythem@yu.edu.jo, haythem.banysalameh@aau.ac.ae,
Dr. Zaid M. Albataineh is an associate professor at Yarmouk University, Jordan. He received his
Ph.D. in Electrical and Computer Eng. from Michigan State University, USA, 2014, and his M.Sc.
degree in the communication and electronic engineering from the Jordan University of Science and
Technology, Jordan, 2009. His research interests include Blind Source Separation, Independent Com-
ponent analysis, Nonnegative matrix Factorization, Wireless Communication, DSP Implementation,
VLSI, Analog Integrated Circuit and RF Integrated Circuit.
Email: zaid.bataineh@yu.edu.jo
Dynamic resource allocation for opportunistic... (Sharhabeel H. Alnabelsi)

Contenu connexe

Tendances

RichardLaca-Resume-Associate Engineer-Telecom
RichardLaca-Resume-Associate Engineer-TelecomRichardLaca-Resume-Associate Engineer-Telecom
RichardLaca-Resume-Associate Engineer-TelecomRichard Laca
 
Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...IJECEIAES
 
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingOptimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingIRJET Journal
 
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...IJECEIAES
 
Integrated approach for efficient power consumption and resource allocation i...
Integrated approach for efficient power consumption and resource allocation i...Integrated approach for efficient power consumption and resource allocation i...
Integrated approach for efficient power consumption and resource allocation i...IJECEIAES
 
Last mile mobile hybrid optical wireless access network routing enhancement
Last mile mobile hybrid optical wireless access network routing enhancementLast mile mobile hybrid optical wireless access network routing enhancement
Last mile mobile hybrid optical wireless access network routing enhancementjournalBEEI
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIAEME Publication
 
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks Yayah Zakaria
 
Scheduling wireless virtual networks functions
Scheduling wireless virtual networks functionsScheduling wireless virtual networks functions
Scheduling wireless virtual networks functionsredpel dot com
 
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...IJMER
 
IRJET- Analysis of Efficient Opportunistic Routing Protocol for Wireless ...
IRJET-  	  Analysis of Efficient Opportunistic Routing Protocol for Wireless ...IRJET-  	  Analysis of Efficient Opportunistic Routing Protocol for Wireless ...
IRJET- Analysis of Efficient Opportunistic Routing Protocol for Wireless ...IRJET Journal
 
Energy packet networks with energy harvesting
Energy packet networks with energy harvestingEnergy packet networks with energy harvesting
Energy packet networks with energy harvestingredpel dot com
 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSijwmn
 
Spectrum sharing in cognitive radio networks
Spectrum sharing in cognitive radio networks Spectrum sharing in cognitive radio networks
Spectrum sharing in cognitive radio networks IJECEIAES
 
IRJET- Internet Video Streaming Service for Social Network
IRJET- Internet Video Streaming Service for Social NetworkIRJET- Internet Video Streaming Service for Social Network
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
 
Abrol2018 article joint_powerallocationandrelayse
Abrol2018 article joint_powerallocationandrelayseAbrol2018 article joint_powerallocationandrelayse
Abrol2018 article joint_powerallocationandrelayseRakesh Jha
 
Performance analysis of economic model and radio resource management in heter...
Performance analysis of economic model and radio resource management in heter...Performance analysis of economic model and radio resource management in heter...
Performance analysis of economic model and radio resource management in heter...IJCNCJournal
 

Tendances (19)

RichardLaca-Resume-Associate Engineer-Telecom
RichardLaca-Resume-Associate Engineer-TelecomRichardLaca-Resume-Associate Engineer-Telecom
RichardLaca-Resume-Associate Engineer-Telecom
 
40120140501003
4012014050100340120140501003
40120140501003
 
Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...
 
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingOptimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
 
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
 
Integrated approach for efficient power consumption and resource allocation i...
Integrated approach for efficient power consumption and resource allocation i...Integrated approach for efficient power consumption and resource allocation i...
Integrated approach for efficient power consumption and resource allocation i...
 
Last mile mobile hybrid optical wireless access network routing enhancement
Last mile mobile hybrid optical wireless access network routing enhancementLast mile mobile hybrid optical wireless access network routing enhancement
Last mile mobile hybrid optical wireless access network routing enhancement
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networks
 
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
 
Scheduling wireless virtual networks functions
Scheduling wireless virtual networks functionsScheduling wireless virtual networks functions
Scheduling wireless virtual networks functions
 
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...
 
IRJET- Analysis of Efficient Opportunistic Routing Protocol for Wireless ...
IRJET-  	  Analysis of Efficient Opportunistic Routing Protocol for Wireless ...IRJET-  	  Analysis of Efficient Opportunistic Routing Protocol for Wireless ...
IRJET- Analysis of Efficient Opportunistic Routing Protocol for Wireless ...
 
Energy packet networks with energy harvesting
Energy packet networks with energy harvestingEnergy packet networks with energy harvesting
Energy packet networks with energy harvesting
 
Analyzing the Signal Flow and RF Planning in GSM Network
Analyzing the Signal Flow and RF Planning in GSM NetworkAnalyzing the Signal Flow and RF Planning in GSM Network
Analyzing the Signal Flow and RF Planning in GSM Network
 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
 
Spectrum sharing in cognitive radio networks
Spectrum sharing in cognitive radio networks Spectrum sharing in cognitive radio networks
Spectrum sharing in cognitive radio networks
 
IRJET- Internet Video Streaming Service for Social Network
IRJET- Internet Video Streaming Service for Social NetworkIRJET- Internet Video Streaming Service for Social Network
IRJET- Internet Video Streaming Service for Social Network
 
Abrol2018 article joint_powerallocationandrelayse
Abrol2018 article joint_powerallocationandrelayseAbrol2018 article joint_powerallocationandrelayse
Abrol2018 article joint_powerallocationandrelayse
 
Performance analysis of economic model and radio resource management in heter...
Performance analysis of economic model and radio resource management in heter...Performance analysis of economic model and radio resource management in heter...
Performance analysis of economic model and radio resource management in heter...
 

Similaire à Dynamic resource allocation for opportunistic software-defined IoT networks: stochastic optimization framework

IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...IJECEIAES
 
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...IJECEIAES
 
Channel Capacity Maximization using NQHN Approach at Heterogeneous Network
Channel Capacity Maximization using NQHN Approach at Heterogeneous NetworkChannel Capacity Maximization using NQHN Approach at Heterogeneous Network
Channel Capacity Maximization using NQHN Approach at Heterogeneous NetworkIJECEIAES
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd Iaetsd
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...IJECEIAES
 
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...IRJET Journal
 
QoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksQoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksjournalBEEI
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach toIJCNCJournal
 
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
 
IoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm
IoT Resource Allocation and Optimization Using Improved Reptile Search AlgorithmIoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm
IoT Resource Allocation and Optimization Using Improved Reptile Search AlgorithmIJCNCJournal
 
IoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm
IoT Resource Allocation and Optimization Using Improved Reptile Search AlgorithmIoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm
IoT Resource Allocation and Optimization Using Improved Reptile Search AlgorithmIJCNCJournal
 
IRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum AllocationIRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum AllocationIRJET Journal
 
Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Pvrtechnologies Nellore
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...IJCNCJournal
 
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...IJCNCJournal
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...IRJET Journal
 

Similaire à Dynamic resource allocation for opportunistic software-defined IoT networks: stochastic optimization framework (20)

IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
 
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
 
Channel Capacity Maximization using NQHN Approach at Heterogeneous Network
Channel Capacity Maximization using NQHN Approach at Heterogeneous NetworkChannel Capacity Maximization using NQHN Approach at Heterogeneous Network
Channel Capacity Maximization using NQHN Approach at Heterogeneous Network
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...
 
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
 
QoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksQoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networks
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
 
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
 
IoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm
IoT Resource Allocation and Optimization Using Improved Reptile Search AlgorithmIoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm
IoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm
 
IoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm
IoT Resource Allocation and Optimization Using Improved Reptile Search AlgorithmIoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm
IoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm
 
IRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum AllocationIRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum Allocation
 
Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
 
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
 

Plus de IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

Plus de IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Dernier

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 

Dernier (20)

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 

Dynamic resource allocation for opportunistic software-defined IoT networks: stochastic optimization framework

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 4, August 2020, pp. 3854∼3861 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i4.pp3854-3861 Ì 3854 Dynamic resource allocation for opportunistic software-defined IoT networks: stochastic optimization framework Sharhabeel H. Alnabelsi1 , Haythem A. Bany Salameh2 , Zaid M. Albataineh3 1 Computer Eng. Dept., Faculty of Eng. Technology, Al-Balqa Applied University, Jordan 1,2 College of Engineering, AL Ain University, AL Ain, United Arab Emirates 2,3 Telecommunications Eng. Dept., Yarmouk University, Jordan Article Info Article history: Received Nov 9, 2019 Revised Feb 11, 2020 Accepted Feb 21, 2020 Keywords: Cognitive radio networks Internet of things Primary users Secondary users Stochastic optimization ABSTRACT Several wireless technologies have recently emerged to enable efficient and scalable Internet-of-Things (IoT) networking. Cognitive radio (CR) technology, enabled by software-defined radios, is considered one of the main IoT-enabling technologies that can provide opportunistic wireless access to a large number of connected IoT devices. An important challenge in this domain is how to dynamically enable IoT transmis- sions while achieving efficient spectrum usage with a minimum total power consump- tion under interference and traffic demand uncertainty. Toward this end, we propose a dynamic bandwidth/channel/power allocation algorithm that aims at maximizing the overall network’s throughput while selecting the set of power resulting in the minimum total transmission power. This problem can be formulated as a two-stage binary linear stochastic programming. Because the interference over different channels is a contin- uous random variable and noting that the interference statistics are highly correlated, a suboptimal sampling solution is proposed. Our proposed algorithm is an adaptive algorithm that is to be periodically conducted over time to consider the changes of the channel and interference conditions. Numerical results indicate that our proposed algorithm significantly increases the number of simultaneous IoT transmissions com- pared to a typical algorithm, and hence, the achieved throughput is improved. Copyright c 2020 Insitute of Advanced Engineeering and Science. All rights reserved. Corresponding Author: Sharhabeel H. Alnabelsi, Computer Engineering Dept., Al-Balqa Applied University, P.O. Box: 15008, Amman 11134, Jordan. Email: alnabsh1@bau.edu.jo 1. INTRODUCTION With the exponential growth of Internet-of-things (IoT) applications and services, it is expected that more than 50 billion devices will be connected to the internet by 2020. IoT networking connects varied wired and wireless devices and systems. The enormous number of connected wireless IoT devices significantly increases the demand for more spectrum resources and efficient spectrum utilization. Software-defined net- working enabled by cognitive radio (CR) technology is considered as a major approach to improve spectrum utilization and provide wireless access to a large number of connected IoT devices. Wireless CR technology allows for rapid deployment of scalable, reliable and intelligent IoT networking. CR technology brings intel- ligence right to the edge of an IoT network. The intelligent offered by the CR at the edge nodes provides a complete connectivity stack virtually between any type of wireless sensors and an IoT controller. Journal homepage: http://ijece.iaescore.com/index.php/IJECE
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 3855 (a) Motivation Due to the fact that the demand in the IoT services and applications is exponentially increasing, CR technology allows to use underutilized spectrum using dynamic spectrum access technique. In a CR network (CRN), CR users, also known as secondary or unlicensed users, are aware about licensed spectrum that used by existing Primary User (PU) networks. CR users can opportunistically access the licensed spectrum by chang- ing their transmission parameters, in order to avoid affecting ongoing PUs’ transmission. This has motivated the need for a new spectrum access technology that introduced in CRNs, such that the spectrum utilization is enhanced without affecting the PUs operation. A CRN is different from the traditional multi-channel wire- less networks. Most importantly, CRN experience out-of-system and in-system random interference. Another characteristic of a CRN is that users may need to transmit with a relatively low signal power, with power masks constraints, in order to avoid causing harmful interference to the PUs [1]. On the other hand, the appli- cations supported by the IoT devices are very diverse, requiring heterogeneous uncertain bandwidth and rate demands. When applying CR technology in IoT networks (CRIoT networks), these peculiar characteristics call for new stochastic channel access mechanism that can efficiently utilize the available spectrum to maximize the number of simultaneous CRIoT transmissions with minimum total transmission power, and improved network throughput[2–9]. (b) Contributions Previous channel assignment approaches in traditional multi-channel and CR wireless networks were designed assuming average interference conditions, fixed channel bandwidth and fixed spectrum demands per user. In this work, we propose a stochastic bandwidth/channel/power allocation algorithm that improves the network performance. The maximization problem can be established as a two-stage stochastic binary linear program. It is worth mentioning that the interference is a continuous random variable that is highly-correlated over time [1, 10–15]. Thus, our optimization problem has an infinite realizations. Therefore, solving for an op- timal solution is impossible. Instead, we propose a suboptimal sampling solution that exploits the interference’s correlation. (c) Organization The rest of this paper is organized as follows: Section 2 presents the related work. In Section 3, the problem model, description and formulation are introduced. Section 4 explains the process of channels assign- ment and bandwidth allocation in the access window. Section 5 shows the numerical results for the performance of our proposed scheme compared with traditional approaches. Finally, Section 6 presents conclusions. 2. RELATED WORK Channels assignment in CRNs is different from the traditional networks, due to the fact that channels availability changes over time due to licensed users activities. Moreover, CR users are power constrained, such that their transmission power should not exceed a certain limit to avoid causing harmful interference to licensed users. Consequently, satisfying CR users data rate demand becomes challenging. Therefore, we are motivated in this work to consider these factors for our proposed adaptive channels assignment technique. For concurrent channels assignment, in [16] authors proposed a scheme that allows a group of CR users to be assigned channels instead of one user at a time, also they assumed channels do not have a fixed bandwidth as a practical assumption, therefore, network throughput is increased. In [16, 17], a guard band notion is introduced between idle channel blocks, in order to minimize the effect of adjacent interference and maximize spectrum efficiency, such that in [17], the number of required guard bands are reduced when grouping idle channels as one block. Two channels assignment methods are developed in [18], in order to maximize spectrum efficiency: the static single-stage method when a centralized spectrum manager does not exist, the second method is an adaptive two-stage technique which is suitable for centralized spectrum manager. In addition to the uncertainty of the channels, the authors also consider two aspects in their models: the fact of adjacent channels interference and channels bonding and aggregation. In addition to many proposed protocols in literature that aim to enhance network capacity, throughput and optimize transmitted power [1, 19, 20]. Fair channels assignment and energy optimization are considered in [21]. CR users transmission power should be controlled, in order to avoid interference with neighbor li- censed users transmission [22]. For CR Ad-Hoc Networks (CRAHNs) [23], transmission power control and spectrum assignment methods are developed to enhance network capacity. Spectrum assignment method is Dynamic resource allocation for opportunistic... (Sharhabeel H. Alnabelsi)
  • 3. 3856 Ì ISSN: 2088-8708 presented in [24] and solved using a learning technique, also an adaptive power allocation method is solved as an optimization problem. The harmful interference reduction to licensed users is studied in [25], also using the deep-reinforcement learning technique [26], mobile CR users empowered to change their physical location when jamming is high. Researchers have studied network connectivity in CRNs, especially, it is essential in routing stability. Noting that its connectivity is different from traditional networks, since the licensed spectrum availability changes over time. In [27], links are established in a way that minimizes interference and enhance connectivity degree. Also, authors in [28] proposed some CR transceivers to be maintain the lowest threshold for connectivity. For routing protection in terms of connectivity, a resilient method is introduced in [29–31]. Also, CR users packets recovery due to primary users activity is studied in [32]. 3. MODELS, PROBLEM DESCRIPTION AND FORMULATIONS 3.1. Network model In this work, we will consider the scenario of a single-hop opportunistic wireless cognitive (unli- censed) radio network (CRN) that tries to exploit spectrum holes in the presence of different (legacy) primary radio networks with channels. CR user acts as a secondary user by continuously scanning the frequency spec- trum and identifying underutilized channels to exploit opportunistic access. The CRN comprises a collection of single-hop users between which requests for packet transmission arise. Each CR user can transmit over one of the M available channels. This can be seen as M possible links. Due to the nature of wireless CRNs, a channel (link), which is occupied by a CR user, cannot be allocated to other CR users in its one-hop communication range. Furthermore, each channel link experiences a random primary network interference conditions, and each CR user has a random demand data rate. To satisfy a given demand, a bandwidth must be allocated for each channel. Because of the radio capability restrictions, the maximum bandwidth (B) that can be used over the various channels is constrained. Therefore, the optimization problem is to determine channel bandwidths that maximizing the over all network throughput (bandwidth utilization) while selecting the set of power resulting in the minimum total transmission power. This problem lends itself to a natural two-stage stochastic integer linear programming. That is, the maximum bandwidth, which can be used by CRN, must be allocated to the various channels before the rate demand and the interference conditions can be known. Once B has been allocated to different channels, CR requests can be served in a manner that allows efficient spectrum use with minimum total power consumption. The optimization of bandwidth/channel/power is an adaptive algorithm that is to be periodically conducted over time to account for the changes for the channel and the primary network interference conditions. The distributions of the rate demands and the interference power are dynamically updated based on localized spectrum and control information observed over the previous transmissions time. 3.2. Assumptions and feasibility conditions Before formulating our optimization problem, we first state our assumptions and feasibility conditions. (a) There are two sets: i ∈ I: channels, and j ∈ J: CR users. (b) The rate demand dj is a discrete uniform random variables, ∀j ∈ J. (c) Each CR user maintains an K-entry historical-data table. The ith entry in the table consists of one fields indicating the previously observed interference over the ith access window (AW) time. (d) The rate demand (dj) and the interference (P (i) I , ∀i ∈ I) are independent random variables. (e) The interference (P (i) I , ∀i ∈ I) is a continuous positive random variable with unknown distribution. (f) The interference at different channels is independent and identically distributed (iid). To ensure a feasible spectrum sharing, we introduce these constraints: (a) At most one channel can be assigned for one transmission. (b) A channel cannot be assigned for more than one transmission. (c) Rate demand constraint: the data rate provided by a channel should be greater than the rate demand of the request that associated with that channel. (d) The CR-to-PU spectrum mask: the maximum allowable transmission power of CR users must be con- strained by a power mask, such that the CR users will not cause unacceptable interference to primary users. (e) The signal to interference noise ratio (SINR) at a CR user should be greater than the minimum required threshold at the selected channel. Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 3854 – 3861
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 3857 3.3. Problem formulation The problem of bandwidth/channel/power allocation can be formulated as a two-stage stochastic pro- gramming. In the first stage, the maximum bandwidth, which can be used by CRN, is allocated to the various channels before the rate demand and the interference conditions can be known. Then, in the second stage, we allocate/select channels/powers to different CR users such as the total power consumption is minimized. To formulate the problem, we introduce the indices, data, random variables, and decision variables: (a) Sets (indices): i ∈ I: channels, and j ∈ J: CR users. (b) Data: B is the total bandwidth that can be allocated to the various channels, M is the number of channels that are to be considered, N is the total number of users, P (i) th is the thermal noise power at the ith channel, and µ∗ is the minimum required signal-to-Interference-and-noise-ratio. (c) Random variables: ξ = (dj, P (i) I ): the random variables that represent the demand and the interference at various channels and different users. (d) Random Data: P (i) j = µ∗ (P (i) th + P (i) I ): the required transmit power over the ith channel for the jth user over the various channels. (e) Decision variables: Xi: is the amount of capacity to be assigned to the ith channel. α (i) j : is channel assignment indicator that is given by: α (i) j = 1, if channel j is assigned to the ith transmission; 0, otherwise. (1) With these notations, the general-recourse model for bandwidth/channel/power problem is given as: max Xi E[h(X, ξ)] M i=1 Xi ≤ B Xi ≥ 0 i ∈ I (2) where h(X, ξ) represents the channel utilization when the demand for service and the interference are given. This function is represented by the optimal value function of a second-stage program. Based on the above notation, the second stage problem can be formulated as follows: max M i=1 N j=1 α (i) j − M i=1 N j=1 α (i) j P (i) j j α (i) j ≤ 1, i ∈ I i α (i) j ≤ 1, j ∈ J i j α (i) j ≤ M α (i) j ∈ {0, 1}, i ∈ I, j ∈ J Xi log2 1 + P (i) j P (i) I +P (i) th − dj ≥ (α (i) j − 1)θ, i ∈ I, j ∈ J (3) where θ is a very large number. Clearly, the formulation in (3) is a two-stage stochastic binary linear program. 3.4. Suboptimal sampling problem formulation Since the interference over different channels is a continuous random variable, the problem instance as described above has an infinite number of scenarios. Therefore, a solution with a deterministic equivalent is not possible. However, by noting that, the interference conditions measured at a certain channel are highly correlated. Thus, the K most recent observed interference scenarios are considered to find a suboptimal solu- tion. To account for the dynamic (random) changes in the interference conditions, our optimization program is an adaptive algorithm that is to be periodically conducted over time (Access window). Now, given the K-entry interference table and considering the constrained listed above, the deterministic equivalent for one scenario ω (ω is one realization) can be formulated as follows: Dynamic resource allocation for opportunistic... (Sharhabeel H. Alnabelsi)
  • 5. 3858 Ì ISSN: 2088-8708 (4) max M i=1 N j=1 α (i) j ω − M i=1 N j=1 α (i) j ω P (i) j ω s.t. M i=1 Xi ≤ B j α (i) j ω ≤ 1, i ∈ I i α (i) j ω ≤ 1, j ∈ J i j α (i) j ω ≤ M α (i) j ω ∈ {0, 1}, i ∈ I, j ∈ J Xi log2 1 + P (i) j ω P (i) I ω + P (i) th − dω j ≥ (α (i) j − 1)θ, ∀i ∈ I, ∀j ∈ J Xi ≥ 0, i ∈ I (5) 4. HISTORICAL SAMPLING/ ACCESS WINDOW At the beginning of an AW and given the interference or demand conditions over the previous AW, the maximum bandwidth, which can be used by CRN, is allocated to the various channels, this conducted in the first stage. This can be achieved by solving the deterministic equivalent for the K-historical samples. In the second stage, where the interference and rate demands are realized, we allocate/select channels/powers to different CR users such as the total power consumption is minimized. During the current AW time, the interference conditions and rate demands are recorded. Then the above process is repeated over and over for every AW time. To illustrate this mechanism, we consider a CRN scenario as shown in Figure 1, where 6 CR pairs content to access 3 different channels. Figure 2 shows the associated timing diagram for decisions or stages of our optimization problem. 1 2 3 4 5 6 Figure 1. Cognitive radios links Update Bandwidth Allocation (1st Stage) Update Bandwidth Allocation (1st Stage) Multiple Channel Assignment (2nd Stage) Multiple Channel Assignment (2nd Stage) t Figure 2. Optimization timing diagram 5. NUMERICAL RESULTS We illustrate the previously discussed optimization process with a numerical example. We compare the performance of our proposed scheme to that of traditional schemes such as the static allocation [1], weighted average schemes [10] and optimal solution. The static assignment is based on providing a fixed-bandwidth per channel irrespective of the user’s demand. The weighted average attempt at providing variable bandwidth depends on the average users’ demand, rather than the actual demand. The optimal solution is found using a brute-force method that requires an exhaustive search over a large state space that increases exponentially with number of channel and number of CR users. We consider 3 primary users networks (M = 3) and 4 CRN links. Suppose that the AW consists of 4 periods, K = 4. We set µ∗ = 3, P (i) th = 0.001, ∀i, and B = 30 Mbps. Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 3854 – 3861
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 3859 At a beginning of an AW, assume that the recorded interference −→ P (i) I : i = 1, 2, 3 and the rate demand dj : j = 1, 2, 3 are given by: P (1) I = {0.25, 0.1, 0.15, 0.25}, and dj = {5, 10, 11, 12}. P (2) I = {0.5, 0.45, 0.35, 0.35}, and dj = {5, 6, 8, 7}. P (3) I = {0.3, 0.2, 0.15, 0.15}, and dj = {10, 10, 10, 10}. Also assume that the interference over the next AW is given by: P (1) I = {0.3, 0.15, 0.2, 0.29}, and dj = {8, 7, 5, 10}. P (2) I = {0.48, 0.46, 0.33, 0.31}, and dj = {6, 8, 5, 5}. P (3) I = {0.27, 0.24, 0.11, 0.25}, and dj = {7, 5, 10, 8}. The reported results are averaged over 100 experiments. Figure 3 shows the details of the two stages of the proposed channel optimization process. The outcome of this process is shown in Figure 4. This figure shows that our stochastic scheme significantly improves network throughput. This improvement is attributed to the the proper bandwidth/channel assignment algorithm. Allocate bandwidth for channels 1, 2, and 3 Assign channels to CR users 1, 2, and 3 Figure 3. Example that illustrates the optimization process in a dynamic CRN. 0 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 Throughput(packets/AW) Time in terms of AW Static Allocation Weighted Average Stochastic Scheme Optimal Bound Figure 4. Comparison of different allocation schemes. 6. CONCLUSIONS In this paper, we propose a novel stochastic bandwidth/channel/power allocation. Our proposed scheme maximizes the CRN throughput through a proper bandwidth/channel allocation process while in the same time minimizes the total power consumption. We proposed a two-stage stochastic bandwidth and channel assignment scheme that dynamically exploits the correlation between the interference conditions and the rate demands to maximize the overall network throughput. Compared to traditional bandwidth/channel allocation schemes, numerical results showed that our proposed scheme reveals significant performance improvement in the overall achieved network throughput. REFERENCES [1] H. Bany Salameh, M. Krunz, O. Younis, “Cooperative adaptive spectrum sharing in cognitive radio net- works,” IEEE/ACM Trans. on Networking(TON), vol.18, no.4, pp. 1181-1194, 2010. [2] M. Bani Hani, H. Bany Salameh, Y. Jararweh, and A. Bousselham, ”Traffic-aware self-coexistence man- agement in IEEE 802.22 WRAN systems,” In 2013 7th IEEE GCC Conference and Exhibition, pp. 507- 510, 2013. [3] A. Ranjan and G. Somani, ”Access control and authentication in the internet of things environment,” Computer Communications and Networks, pp. 283-305, 2016. [4] H. Al-Mahdi, F. Yasser, ”Design and analysis of routing protocol for cognitive radio ad hoc networks in Heterogeneous Environment,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 1, pp. 341-351, 2019. [5] A. Khan, M. Rehmani, and A. Rachedi, ”Cognitive-radio-based internet of things: Applications, architec- tures, spectrum related functionalities, and future research directions”, IEEE Wireless Communications, Vol. 24, No.3, pp. 17-25, 2017. Dynamic resource allocation for opportunistic... (Sharhabeel H. Alnabelsi)
  • 7. 3860 Ì ISSN: 2088-8708 [6] H. Bany Salameh, S. Almajali, M. Ayyash, and H. Elgala, ”Security-aware channel assignment in IoT- based cognitive radio networks for time-critical applications,” Fourth International Conference on Soft- ware Defined Systems (SDS), pp. 43-47, Valencia, 2017. [7] S. Razmi, N. Parhizgar, ”Adaptive resources assignment in OFDM-based cognitive radio systems,” Inter- national Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 3, pp. 1935-1943, 2019. [8] P. Varade, A. Wabale, R. Yerram, and R. Jaiswal, ”Throughput Maximization of Cognitive Radio Multi Relay Network with Interference Management,” International Journal of Electrical and Computer Engi- neering (IJECE), vol. 8, no. 4, pp. 2230-2238, 2018. [9] S. Lakhal, Z. Guennoun, ”Equity-based free channels assignment for secondary users in a cognitive radio network,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 3, pp. 2057- 2063, 2019. [10] H. Bany Salameh, ”Efficient Resource Allocation for Multi-cell Heterogeneous Cognitive Networks With Varying Spectrum Availability,” IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6628- 6635, 2016. [11] H. Bany Salameh, H. Kasasbeh and B. Harb, ”A Batch-Based MAC Design With Simultaneous As- signment Decisions for Improved Throughput in Guard-Band-Constrained Cognitive Networks,” IEEE Transactions on Communications, vol. 64, no. 3, pp. 1143-1152, March 2016. [12] A. Doulat, A. Al Abed Al Aziz, M. Al-Ayyoub, Y. Jararweh, H. Bany Salameh and A. A. Khreishah, ”Software defined framework for multi-cell Cognitive Radio Networks,” IEEE 10th International Con- ference on Wireless and Mobile Computing, Networking and Communications (WiMob), Larnaca, pp. 513-518, 2014. [13] H. Bany Salameh, O. Badarneh, ”Opportunistic medium access control for maximizing packet delivery rate in dynamic access networks,” Journal of Network and Computer Applications, Volume 36, Issue 1, pp. 523-532, 2013. [14] M. Labib, S. Ha, W. Saad, and J. H. Reed, ”A colonel blotto game for anti-jamming in the internet of things,” in the IEEE Global Communications Conference (GLOBECOM), pp. 1-6, Dec 2015. [15] N. Namvar, W. Saad, N. Bahadori, and B. Kelley, ”Jamming in the internet of things: A game-theoretic perspective,” in IEEE Global Communications Conference (GLOBECOM), Dec 2016, pp. 1-6. [16] H. Bany Salameh, H. Kasasbeh and B. Harb, “An Opportunistic Guard-band-aware Channel Assignment: A batch-based Approach”, Proc. of the IEEE WCNC’16 Conference, Qatar, pp. 1-6, April 2016. [17] G. S. Uyanik, M. J. Abdel-Rahman, and M. Krunz, ”Optimal guardband-aware channel assignment with bonding and aggregation in multi-channel systems,” in IEEE Proceedings of GLOBECOM Conference, pp. 4769-4774, Dec. 2013. [18] M. A. Rahman, M. Krunz, “Stochastic guard-band-aware channel assignment with bonding and aggrega- tion for DSA networks,” IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 3888-3898, Jul. 2015. [19] M. I. B. Shahid, J. Kamruzzaman, M. R. Hassan, “Modeling multi-user spectrum allocation for cognitive radio networks,” Comput. Electr. Eng., vol. 52, pp. 266-283, May 2016. [20] S. Qureshi, S. Ahmad, A. Ikram, N. Hasan. ”Joint energy and throughput based multi-channel assignment in cognitive radio sensor network,” In 2016 IEEE 3rd International Symposium on Telecommunication Technologies (ISTT), pp. 65-69, 2016. [21] Z.-H. Wei and B.-J. Hu, ”A fair multi-channel assignment algorithm with practical implementation in distributed cognitive radio networks,” IEEE Access, vol. 6, pp. 14255–14267, 2018. [22] H. Bany Salameh, M. Krunz, D. Manzi, “Spectrum Bonding and Aggregation with Guard-band-awareness in Cognitive Radio Networks,” IEEE Transaction on Mobile Computing, vol.13, no.3, pp.569-581, March 2014. [23] J. Chen, S. Ping, J. Jia, Y. Deng, M. Dohler, and H. Aghvami, “Cross-layer optimization for spectrum aggregation-based cognitive radio ad-hoc networks,” in Proc. IEEE GLOBECOM, pp. 1-6, Dec. 2017. [24] M. Ghorbel, B. Hamdaoui, R. Hamdi, M. Guizani, and M. NoroozOliaee, “Distributed dynamic spec- trum access with adaptive power allocation: Energy efficiency and cross layer awareness,” in Proc. IEEE INFOCOM, pp. 694-699, Apr. 2014. [25] L. Lei, and C. Chigan, ”A Virtual MIMO based anti-jamming strategy for cognitive radio networks,” In 2016 IEEE International Conference on Communications (ICC), pp. 1-6, 2016. Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 3854 – 3861
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 3861 [26] G. Han, L. Xiao, and H. Poor, ”Two-dimensional anti-jamming communication based on deep reinforce- ment learning,” In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2087-2091, 2017. [27] A. Ralhan, R. Yadav, and R. Misra, ”Minimum Interference Topology Control in Cognitive Radio Net- works through Channel Assignment,” In 2018 International Conference on Advances in Computing, Com- munications and Informatics (ICACCI), pp. 1418-1423, 2018. [28] R. Irwin, A. MacKenzie, L. DaSilva, ”Resource-minimized channel assignment for multi-transceiver cog- nitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 3, pp. 442-450, 2013. [29] P. Tseng, W. Chung, P. Hsiu, ”Minimum interference topology construction for robust multi-hop cognitive radio networks,” In 2013 IEEE Wireless Communications and Networking Conference (WCNC), pp. 101- 105, 2013. [30] S. H. Alnabelsi and A. E. Kamal, ”Resilient multicast routing in CRNs using a multilayer hyper-graph approach,” IEEE International Conference on Communications (ICC), Budapest, pp. 2910-2915, 2013. [31] S. H. Alnabelsi, ”Finding an Immuned Path against Single Primary User Activity in Cognitive Radio Net- works,” International Journal on Communications Antenna and Propagation (IRECAP), Praise Worthy Prize, Italy, 2017. [32] S. H. Alnabelsi, and A. E. Kamal, ”Interference-based packet recovery for energy saving in Cognitive Radio Networks,” IEEE International Conference on Communications (ICC), Ottawa, pp. 5978-5982, 2012. BIOGRAPHIES OF AUTHORS Dr. Sharhabeel H. Alnabelsi is an associate professor at Computer and Networks Eng. Dept. at Al-Balqa Applied University, Jordan. He is also with the computer Eng. Dept. at Al Ain University, UAE. He received his Ph.D. in computer engineering from Iowa State University, USA, 2012. He received his M.Sc. in computer engineering from The University of Alabama in Huntsville, USA, 2007. His research interests include Cognitive Radio Networks, Wireless Sensor Networks. Email: alnabsh1@bau.edu.jo, sharhabeel.alnabelsi@aau.ac.ae Prof. Haythem A. Bany Salameh is a Professor of Networks Communication Engineering with Al Ain University, UAE. He received the Ph.D. degree in electrical and computer engineering from the University of Arizona, USA, 2009. He is also in a sabbatical leave from Yarmouk University, Jordan. In August 2009, he joined YU, after a brief postdoctoral position with the University of Arizona. His research interests include optical communication technology and wireless networking. In the summer of 2008, he was a member of the R&D Long-Term Evolution Development Group, QUAL- COMM, Inc., San Diego, CA, USA. He is an IEEE Senior Member class of 2016. Email: haythem@yu.edu.jo, haythem.banysalameh@aau.ac.ae, Dr. Zaid M. Albataineh is an associate professor at Yarmouk University, Jordan. He received his Ph.D. in Electrical and Computer Eng. from Michigan State University, USA, 2014, and his M.Sc. degree in the communication and electronic engineering from the Jordan University of Science and Technology, Jordan, 2009. His research interests include Blind Source Separation, Independent Com- ponent analysis, Nonnegative matrix Factorization, Wireless Communication, DSP Implementation, VLSI, Analog Integrated Circuit and RF Integrated Circuit. Email: zaid.bataineh@yu.edu.jo Dynamic resource allocation for opportunistic... (Sharhabeel H. Alnabelsi)