All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Symbol error probability of secondary user in underlay cognitive radio networks with adaptive transmit power constraint

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F20%3A10245886" target="_blank" >RIV/61989100:27240/20:10245886 - isvavai.cz</a>

  • Alternative codes found

    RIV/61989100:27740/20:10245886

  • Result on the web

    <a href="https://link.springer.com/chapter/10.1007/978-3-030-59000-0_23" target="_blank" >https://link.springer.com/chapter/10.1007/978-3-030-59000-0_23</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1007/978-3-030-59000-0_23" target="_blank" >10.1007/978-3-030-59000-0_23</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Symbol error probability of secondary user in underlay cognitive radio networks with adaptive transmit power constraint

  • Original language description

    The objective of this paper is to study the performance of a cognitive radio network (CRN) under the influence of an eavesdropper (EAV) which can wiretap the primary user (PU) communication. In this CRN, the secondary transmitter (SU)&apos;s transmit power is susceptible to the collaborative constraint of its peak transmit power. Consequently, the author groups derive an adaptive transmit power policy and analytical expression of symbol error probability for the SU. From the numerical results that were obtained, it can be concluded that as the SU presents in the CRN, the primary network security is enhanced. Readers as operators or system designers may find this paper useful as it provides information about the cooperation of the PU and SU in a spectrum sharing CRN to prevent security attack. (C) Springer Nature Switzerland AG 2020.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    20203 - Telecommunications

Result continuities

  • Project

    <a href="/en/project/LM2018140" target="_blank" >LM2018140: e-Infrastructure CZ</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2020

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Communications in Computer and Information Science. Volume 1284

  • ISBN

    978-3-030-58999-8

  • ISSN

    1865-0929

  • e-ISSN

    1865-0937

  • Number of pages

    13

  • Pages from-to

    307-319

  • Publisher name

    Springer

  • Place of publication

    Cham

  • Event location

    Krakov

  • Event date

    Oct 8, 2020

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article