Performance of an opportunistic multi-user cognitive network with multiple primary users

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Consider a multi-user underlay cognitive network where multiple cognitive users, having limited peak transmit power, concurrently share the spectrum with a primary network with multiple users. The channel between the secondary network is assumed to have independent but not identical Nakagami-m fading. The interference channel between the secondary users and the primary users is assumed to have Rayleigh fading. The uplink scenario is considered where a single secondary user is selected for transmission. This opportunistic selection depends on the transmission channel power gain and the interference channel power gain as well as the power allocation policy adopted at the users. Exact closed form expressions for the momentgenerating function, outage performance and the symbol-error-rate performance are derived. The outage performance is also studied in the asymptotic regimes and the generalized diversity gain of this scheduling scheme is derived. Numerical results corroborate the derived analytical results.

Original languageEnglish
Title of host publicationIEEE Wireless Communications and Networking Conference, WCNC
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages128-132
Number of pages5
ISBN (Electronic)9781479930838
DOIs
Publication statusPublished - 3 Apr 2016
Externally publishedYes
Event2014 IEEE Wireless Communications and Networking Conference, WCNC 2014 - Istanbul, Turkey
Duration: 6 Apr 20149 Apr 2014

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
ISSN (Print)1525-3511

Conference

Conference2014 IEEE Wireless Communications and Networking Conference, WCNC 2014
Country/TerritoryTurkey
CityIstanbul
Period6/04/149/04/14

Fingerprint

Dive into the research topics of 'Performance of an opportunistic multi-user cognitive network with multiple primary users'. Together they form a unique fingerprint.

Cite this