Capacity maximisation of the secondary link in cognitive radio networks with hybrid spectrum access strategy
A hybrid spectrum access strategy which is different from traditional underlay or overlay strategy is proposed. In this strategy, the secondary users cooperatively sense the states of the primary users in the sharing spectrum band. Based on the sensing results and an additional requirement on the bi...
Saved in:
| Published in | IET communications Vol. 8; no. 5; pp. 689 - 696 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
Stevenage
The Institution of Engineering and Technology
01.03.2014
John Wiley & Sons, Inc |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1751-8628 1751-8636 1751-8636 |
| DOI | 10.1049/iet-com.2013.0696 |
Cover
| Abstract | A hybrid spectrum access strategy which is different from traditional underlay or overlay strategy is proposed. In this strategy, the secondary users cooperatively sense the states of the primary users in the sharing spectrum band. Based on the sensing results and an additional requirement on the bit error rate, the secondary transmitter adapts its transmit power and modulation level. Specifically, if the primary user is detected to be inactive, the secondary transmitter allocates its power subject to a peak transmit power constraint. Else if the primary user is active, the average interference power constraint would also be imposed to protect the primary transmission. To demonstrate the superiority of the hybrid strategy, capacity of the secondary link with this strategy over Rayleigh fading channel is studied. It has been assumed that diversity combing technique is available at the secondary receiver. Perfect and imperfect estimations of the channel power gain from secondary transmitter to primary receiver are also considered. Then the expression of capacity of the secondary link is derived by using Lagrange dual decomposition method. Simulation results demonstrate that the capacity of the secondary link with hybrid strategy is significantly improved when compared with the traditional ones. |
|---|---|
| AbstractList | A hybrid spectrum access strategy which is different from traditional underlay or overlay strategy is proposed. In this strategy, the secondary users cooperatively sense the states of the primary users in the sharing spectrum band. Based on the sensing results and an additional requirement on the bit error rate, the secondary transmitter adapts its transmit power and modulation level. Specifically, if the primary user is detected to be inactive, the secondary transmitter allocates its power subject to a peak transmit power constraint. Else if the primary user is active, the average interference power constraint would also be imposed to protect the primary transmission. To demonstrate the superiority of the hybrid strategy, capacity of the secondary link with this strategy over Rayleigh fading channel is studied. It has been assumed that diversity combing technique is available at the secondary receiver. Perfect and imperfect estimations of the channel power gain from secondary transmitter to primary receiver are also considered. Then the expression of capacity of the secondary link is derived by using Lagrange dual decomposition method. Simulation results demonstrate that the capacity of the secondary link with hybrid strategy is significantly improved when compared with the traditional ones. A hybrid spectrum access strategy which is different from traditional underlay or overlay strategy is proposed. In this strategy, the secondary users cooperatively sense the states of the primary users in the sharing spectrum band. Based on the sensing results and an additional requirement on the bit error rate, the secondary transmitter adapts its transmit power and modulation level. Specifically, if the primary user is detected to be inactive, the secondary transmitter allocates its power subject to a peak transmit power constraint. Else if the primary user is active, the average interference power constraint would also be imposed to protect the primary transmission. To demonstrate the superiority of the hybrid strategy, capacity of the secondary link with this strategy over Rayleigh fading channel is studied. It has been assumed that diversity combing technique is available at the secondary receiver. Perfect and imperfect estimations of the channel power gain from secondary transmitter to primary receiver are also considered. Then the expression of capacity of the secondary link is derived by using Lagrange dual decomposition method. Simulation results demonstrate that the capacity of the secondary link with hybrid strategy is significantly improved when compared with the traditional ones. [PUBLICATION ABSTRACT] |
| Author | Tan, Xiaobo Hu, Jian Zhang, Hang |
| Author_xml | – sequence: 1 givenname: Xiaobo surname: Tan fullname: Tan, Xiaobo email: txb8613@gmail.com organization: 1Institute of Communications Engineering, PLA University of Science and Technology, Nanjing 210007, People's Republic of China – sequence: 2 givenname: Hang surname: Zhang fullname: Zhang, Hang organization: 1Institute of Communications Engineering, PLA University of Science and Technology, Nanjing 210007, People's Republic of China – sequence: 3 givenname: Jian surname: Hu fullname: Hu, Jian organization: 2Ustinov College, Durham University, Durham, DH1 4PH, UK |
| BookMark | eNqNkUtv1DAURi1UJNqBH8DOEhtYZPBjYsfsIGqhUqtuhrXlceyO28QOtsOQf4-HIEAVKqzsxfnu49wzcOKDNwC8xGiN0Ua8dSZXOgxrgjBdIybYE3CKeY2rhlF28utPmmfgLKU7hOqabTanoG_VqLTLMxzUNze4pLILHgYL897AZHTwnYoz7J2_h85DHW69y-6rgVF1LkBv8iHE-wQPLu_hft5F18E0Gp3jNECltUkJphxVNrfzc_DUqj6ZFz_fFdhenG_bT9XVzcfL9v1VpTec8MruECNCNDuCBO14xyyiujNcq0ZwUhOOuWlqZK2xNePaKoEIp5gx2yFuOroCZCk7-VHNB9X3coxuKGtIjORRlyy6ZNElj7rkUVcJvV5CYwxfJpOyLDK06XvlTZiSxHUtmEAMi4K-eoDehSn6slGhaJmPUUILhRdKx5BSNPa_huAPMuU0Py5SDLr-0eS7JXlwvZn_3Uq215_JhwuEcVG3AtUSPmK_d3mk2Zu_8JfnW9neXP_RY-ws_Q4bE88P |
| CitedBy_id | crossref_primary_10_1109_TCOMM_2016_2522435 crossref_primary_10_1109_TWC_2015_2503272 crossref_primary_10_1007_s11042_017_4671_4 crossref_primary_10_1186_s13638_016_0617_1 crossref_primary_10_3390_s19204398 crossref_primary_10_1007_s10776_017_0352_5 |
| Cites_doi | 10.1109/LCOMM.2012.122012.122341 10.1109/LCOMM.2012.071612.121206 10.1109/TWC.2012.032712.101209 10.1109/TWC.2010.090210.100291 10.1109/WCL.2012.042512.120198 10.1109/JPROC.2009.2015717 10.1109/TMC.2010.57 10.1109/TCOMM.2009.12.080400 10.1109/MWC.2007.4300978 10.1109/MCOM.2009.4752688 10.1109/JSAC.2006.879350 10.1109/TWC.2008.060869 10.1109/TWC.2007.05447 |
| ContentType | Journal Article |
| Copyright | The Institution of Engineering and Technology 2021 The Institution of Engineering and Technology Copyright The Institution of Engineering & Technology Mar 2014 |
| Copyright_xml | – notice: The Institution of Engineering and Technology – notice: 2021 The Institution of Engineering and Technology – notice: Copyright The Institution of Engineering & Technology Mar 2014 |
| DBID | AAYXX CITATION 8FE 8FG ABJCF AFKRA ARAPS BENPR BGLVJ CCPQU DWQXO HCIFZ L6V M7S P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS S0W 7SC 7SP 8FD JQ2 L7M L~C L~D ADTOC UNPAY |
| DOI | 10.1049/iet-com.2013.0696 |
| DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection Proquest Central Technology Collection ProQuest One ProQuest Central SciTech Premium Collection ProQuest Engineering Collection Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection DELNET Engineering & Technology Collection Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Advanced Technologies & Aerospace Collection Engineering Database Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest One Academic Eastern Edition SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest DELNET Engineering and Technology Collection Materials Science & Engineering Collection ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) Engineering Collection Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database CrossRef Advanced Technologies & Aerospace Collection |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1751-8636 |
| EndPage | 696 |
| ExternalDocumentID | 10.1049/iet-com.2013.0696 3333128121 10_1049_iet_com_2013_0696 CMU2BF01127 |
| Genre | article Feature |
| GrantInformation_xml | – fundername: National Basic Research Program of China funderid: 2009CB320400 – fundername: National Science Foundation of China funderid: 61001106 |
| GroupedDBID | 0R 24P 29I 4IJ 5GY 6IK 8FE 8FG 8VB AAJGR ABJCF ABPTK ACGFS ACIWK AENEX AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS BENPR BFFAM BGLVJ CS3 DU5 ESX HCIFZ HZ IFIPE IPLJI JAVBF L6V LAI LOTEE LXI M43 M7S MS NADUK NXXTH O9- OCL P62 PTHSS QWB RIE RNS RUI S0W U5U UNMZH UNR ZL0 ZZ .DC 0R~ 0ZK 1OC 2QL 4.4 6OB 96U AAHHS AAHJG ABQXS ACCFJ ACCMX ACESK ACGFO ACXQS ADEYR AEEZP AEGXH AEQDE AFAZI AIAGR AIWBW AJBDE ALUQN AVUZU CCPQU EBS EJD F8P GOZPB GROUPED_DOAJ GRPMH HZ~ IAO ITC K1G MCNEO MS~ OK1 ROL ~ZZ AAMMB AAYXX AEFGJ AFFHD AGXDD AIDQK AIDYY CITATION IDLOA PHGZM PHGZT PQGLB WIN DWQXO PKEHL PQEST PQQKQ PQUKI PRINS 7SC 7SP 8FD JQ2 L7M L~C L~D PUEGO ADTOC UNPAY |
| ID | FETCH-LOGICAL-c4727-fb062998b2093d7d6f03cde7ca897252717e850ffef567cfa90273166fd07ed3 |
| IEDL.DBID | IDLOA |
| ISSN | 1751-8628 1751-8636 |
| IngestDate | Wed Oct 01 16:43:08 EDT 2025 Thu Oct 02 09:53:54 EDT 2025 Wed Aug 13 06:24:18 EDT 2025 Wed Oct 29 21:24:30 EDT 2025 Thu Apr 24 23:07:57 EDT 2025 Wed Jan 22 16:58:52 EST 2025 Tue Jan 05 21:44:04 EST 2021 Thu May 09 18:13:38 EDT 2019 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 5 |
| Keywords | Rayleigh fading channel radio spectrum management interference power constraint diversity reception interference suppression modulation level modulation Rayleigh channels secondary link hybrid spectrum access strategy bit error rate cognitive radio peak transmit power constraint diversity combining technique Lagrange dual decomposition capacity maximisation cognitive radio network channel power gain error statistics |
| Language | English |
| License | http://onlinelibrary.wiley.com/termsAndConditions#vor |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c4727-fb062998b2093d7d6f03cde7ca897252717e850ffef567cfa90273166fd07ed3 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/iet-com.2013.0696 |
| PQID | 1535276323 |
| PQPubID | 1936360 |
| PageCount | 8 |
| ParticipantIDs | proquest_miscellaneous_1559690619 unpaywall_primary_10_1049_iet_com_2013_0696 crossref_citationtrail_10_1049_iet_com_2013_0696 crossref_primary_10_1049_iet_com_2013_0696 iet_journals_10_1049_iet_com_2013_0696 wiley_primary_10_1049_iet_com_2013_0696_CMU2BF01127 proquest_journals_1535276323 |
| ProviderPackageCode | RUI |
| PublicationCentury | 2000 |
| PublicationDate | March 2014 |
| PublicationDateYYYYMMDD | 2014-03-01 |
| PublicationDate_xml | – month: 03 year: 2014 text: March 2014 |
| PublicationDecade | 2010 |
| PublicationPlace | Stevenage |
| PublicationPlace_xml | – name: Stevenage |
| PublicationTitle | IET communications |
| PublicationYear | 2014 |
| Publisher | The Institution of Engineering and Technology John Wiley & Sons, Inc |
| Publisher_xml | – name: The Institution of Engineering and Technology – name: John Wiley & Sons, Inc |
| References | Asghari, V.; Aissa, S. (C5) 2010; 9 Khoshkholgh, M.G.; Navaie, K.; Yanikomeroglu, H. (C9) 2010; 9 Liang, Y.-C.; Zeng, Y.; Peh, E.C.Y.; Hoang, A.T. (C12) 2008; 7 Palomar, D.; Chiang, M. (C13) 2006; 24 Zhao, Q.; Swami, A. (C3) 2007; 14 Yang, C.; Fu, Y.; Zhang, Y.; Xie, S.; Yu, R. (C10) 2013; 17 Ghasemi, A.; Sousa, E.S. (C4) 2007; 6 Stevenson, C.; Chouinard, G.; Lei, Z. (C2) 2009; 47 Yang, Y.; Aissa, S. (C6) 2012; 1 Bouida, Z.; Tourki, K.; Ghrayeb, A.; Qaraqe, K.; Alouini, M. (C7) 2012; 16 Chakravarthy, V.; Li, X.; Wu, Z. (C8) 2009; 57 Goldsmith, A.; Jafar, S.A.; Scinivasa (C1) 2009; 97 Senthuran, S.; Anpalagan, A.; Das, O. (C11) 2012; 11 2009; 47 2007; 6 2008; 7 2009; 57 2012; 16 2013; 17 2009; 97 2012; 1 2006; 24 2012; 11 2007; 14 2010; 9 e_1_2_8_13_1 e_1_2_8_14_1 e_1_2_8_3_1 e_1_2_8_2_1 e_1_2_8_5_1 e_1_2_8_4_1 e_1_2_8_7_1 e_1_2_8_6_1 e_1_2_8_9_1 e_1_2_8_8_1 e_1_2_8_10_1 e_1_2_8_11_1 e_1_2_8_12_1 |
| References_xml | – volume: 14 start-page: 14 issue: 4 year: 2007 end-page: 20 ident: C3 article-title: A decision-theoretic framework for opportunistic spectrum access publication-title: IEEE Wirel. Commun. Mag. – volume: 1 start-page: 312 issue: 4 year: 2012 end-page: 315 ident: C6 article-title: Achievable data rate in spectrum-sharing channels with variable-rate variable-power primary users publication-title: IEEE Wirel. Commun. Lett. – volume: 9 start-page: 3272 issue: 10 year: 2010 end-page: 3280 ident: C5 article-title: Adaptive rate and power transmission in spectrum-sharing systems publication-title: IEEE Trans. Wirel. Commun. – volume: 97 start-page: 894 issue: 5 year: 2009 end-page: 914 ident: C1 article-title: Breaking spectrum gridlock with cognitive radios: an information theoretic perspective publication-title: Proc. IEEE – volume: 11 start-page: 2024 issue: 6 year: 2012 end-page: 2035 ident: C11 article-title: Throughput analysis of opportunistic access strategies in hybrid underlay–overlay cognitive radio networks publication-title: IEEE Trans. Wirel. Commun. – volume: 7 start-page: 1326 issue: 4 year: 2008 end-page: 1337 ident: C12 article-title: Sensing-throughput tradeoff for cognitive radio networks publication-title: IEEE Trans. Wirel. Commun. – volume: 47 start-page: 130 issue: 1 year: 2009 end-page: 138 ident: C2 article-title: IEEE 802.22: the first cognitive radio wireless regional area work standard publication-title: IEEE Commun. Mag. – volume: 6 start-page: 649 issue: 2 year: 2007 end-page: 658 ident: C4 article-title: Fundamental limits of spectrum sharing in fading environments publication-title: IEEE Trans. Wirel. Commun. – volume: 17 start-page: 329 issue: 2 year: 2013 end-page: 332 ident: C10 article-title: Energy-efficient hybrid spectrum access scheme in cognitive vehicular ad hoc networks publication-title: IEEE Commun. Lett. – volume: 16 start-page: 1482 issue: 9 year: 2012 end-page: 1485 ident: C7 article-title: Power adaption for joint switched diversity and adaptive modulation schemes in spectrum sharing systems publication-title: IEEE Commun. Lett. – volume: 57 start-page: 3794 issue: 12 year: 2009 end-page: 3804 ident: C8 article-title: Novel overlay/underlay cognitive radio waveforms using SD-SMSE framework to enhance spectrum efficiency – Part I: Theoretical framework and analysis in AWGN channel publication-title: IEEE Trans. Commun. – volume: 24 start-page: 1439 issue: 8 year: 2006 end-page: 1451 ident: C13 article-title: A tutorial on decomposition methods for network utility maximization publication-title: IEEE J. Sel. Areas Commun. – volume: 9 start-page: 1780 issue: 12 year: 2010 end-page: 1793 ident: C9 article-title: Access strategies for spectrum sharing in fading environment: Overlay, underlay, and mixed publication-title: IEEE Trans. Mobile Comput. – volume: 6 start-page: 649 issue: 2 year: 2007 end-page: 658 article-title: Fundamental limits of spectrum sharing in fading environments publication-title: IEEE Trans. Wirel. Commun. – volume: 57 start-page: 3794 issue: 12 year: 2009 end-page: 3804 article-title: Novel overlay/underlay cognitive radio waveforms using SD‐SMSE framework to enhance spectrum efficiency – Part I: Theoretical framework and analysis in AWGN channel publication-title: IEEE Trans. Commun. – volume: 47 start-page: 130 issue: 1 year: 2009 end-page: 138 article-title: IEEE 802.22: the first cognitive radio wireless regional area work standard publication-title: IEEE Commun. Mag. – volume: 14 start-page: 14 issue: 4 year: 2007 end-page: 20 article-title: A decision‐theoretic framework for opportunistic spectrum access publication-title: IEEE Wirel. Commun. Mag. – volume: 24 start-page: 1439 issue: 8 year: 2006 end-page: 1451 article-title: A tutorial on decomposition methods for network utility maximization publication-title: IEEE J. Sel. Areas Commun. – volume: 9 start-page: 1780 issue: 12 year: 2010 end-page: 1793 article-title: Access strategies for spectrum sharing in fading environment: Overlay, underlay, and mixed publication-title: IEEE Trans. Mobile Comput. – volume: 9 start-page: 3272 issue: 10 year: 2010 end-page: 3280 article-title: Adaptive rate and power transmission in spectrum‐sharing systems publication-title: IEEE Trans. Wirel. Commun. – volume: 7 start-page: 1326 issue: 4 year: 2008 end-page: 1337 article-title: Sensing‐throughput tradeoff for cognitive radio networks publication-title: IEEE Trans. Wirel. Commun. – volume: 1 start-page: 312 issue: 4 year: 2012 end-page: 315 article-title: Achievable data rate in spectrum‐sharing channels with variable‐rate variable‐power primary users publication-title: IEEE Wirel. Commun. Lett. – volume: 16 start-page: 1482 issue: 9 year: 2012 end-page: 1485 article-title: Power adaption for joint switched diversity and adaptive modulation schemes in spectrum sharing systems publication-title: IEEE Commun. Lett. – volume: 11 start-page: 2024 issue: 6 year: 2012 end-page: 2035 article-title: Throughput analysis of opportunistic access strategies in hybrid underlay–overlay cognitive radio networks publication-title: IEEE Trans. Wirel. Commun. – volume: 17 start-page: 329 issue: 2 year: 2013 end-page: 332 article-title: Energy‐efficient hybrid spectrum access scheme in cognitive vehicular ad hoc networks publication-title: IEEE Commun. Lett. – volume: 97 start-page: 894 issue: 5 year: 2009 end-page: 914 article-title: Breaking spectrum gridlock with cognitive radios: an information theoretic perspective publication-title: Proc. IEEE – ident: e_1_2_8_11_1 doi: 10.1109/LCOMM.2012.122012.122341 – ident: e_1_2_8_8_1 doi: 10.1109/LCOMM.2012.071612.121206 – ident: e_1_2_8_12_1 doi: 10.1109/TWC.2012.032712.101209 – ident: e_1_2_8_6_1 doi: 10.1109/TWC.2010.090210.100291 – ident: e_1_2_8_7_1 doi: 10.1109/WCL.2012.042512.120198 – ident: e_1_2_8_2_1 doi: 10.1109/JPROC.2009.2015717 – ident: e_1_2_8_10_1 doi: 10.1109/TMC.2010.57 – ident: e_1_2_8_9_1 doi: 10.1109/TCOMM.2009.12.080400 – ident: e_1_2_8_4_1 doi: 10.1109/MWC.2007.4300978 – ident: e_1_2_8_3_1 doi: 10.1109/MCOM.2009.4752688 – ident: e_1_2_8_14_1 doi: 10.1109/JSAC.2006.879350 – ident: e_1_2_8_13_1 doi: 10.1109/TWC.2008.060869 – ident: e_1_2_8_5_1 doi: 10.1109/TWC.2007.05447 |
| SSID | ssj0055644 |
| Score | 2.0722413 |
| Snippet | A hybrid spectrum access strategy which is different from traditional underlay or overlay strategy is proposed. In this strategy, the secondary users... |
| SourceID | unpaywall proquest crossref wiley iet |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 689 |
| SubjectTerms | Band spectra bit error rate capacity maximisation channel power gain Channels Cognitive radio cognitive radio network diversity combining technique diversity reception error statistics hybrid spectrum access strategy interference power constraint interference suppression Lagrange dual decomposition Links Modulation modulation level peak transmit power constraint radio spectrum management Rayleigh channels Rayleigh fading channel Receivers secondary link Strategy Transmitters |
| SummonAdditionalLinks | – databaseName: Proquest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LbxMxELba9AA9oPIS2xZkEOIAMvW-vOsDqmiUqCAlIJRKva28fohIyW6aNIL8e2b2RXIJXNfjleUZez57xt8Q8laGkU59xxnPk4BFgZIst7FjXOdacp2CjeB9x2gsrm-ir7fx7QEZt29hMK2y3ROrjdqUGu_IL3zkIYHFEISXizuGVaMwutqW0FBNaQXzqaIYOyRHATJj9cjR1WD8_Ue7N8exqMq7gs_0GWD5tItzyoupvWeYQAIeMfzIBbL4b3mqQ2jeAaEP1sVCbX6p2WwX1lZ-aXhCHjWAkn6uLeAxObDFE3K8RTP4lMz64BE1wG06V7-n8yaBh5aOAvqjKzwSG7XcUAzm0mlBu5QiulRmWtKiThVfUby0pT83-MiLVk80l-s5VVXJRbqqaW43z8hkOJj0r1lTZYHpCMALczkX4JPSPOAyNIkRjofa2ESrVCYBzLmf2DTmzlkXi0Q7JZECxxfCGZ5YEz4nvaIs7AtCAbxECRda5b6KRGDyVMDpBvBkGEbOpMojvJ3QTDcM5FgIY5ZVkfBIZjDJGeggQx1kqAOPvO-6LGr6jX3C7_BbswhX-wTf7Ah-GUyy_rfRX4FsYZxHzlttb_2ys0KPvO6aQXEYZlGFLdcoE0ukf_alRz50VvI_ww8rO_q3ZNYf3QRXQ9iag-R0_zDPyEPoFtVZc-ekB4ZhXwKMus9fNWvjDzjoGW4 priority: 102 providerName: ProQuest – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3db9MwED9t3QPwsPEpMjZkEOIBlM6NHSd-3KqVgdTBQyuNp8jxh1bRptXaCspfv3OSZitCAyTerORix_ad73f23RngjWRcpx1HQ5onUcgjJcPcxi6kOteS6hR5xO939M_F2ZB_uogvtuDDOhamyg_RbLh5ySjXay_gM-Oqdb6yOrk8GtlF6J0-UIuxNhVSbMOOiBGUt2BneP7l-GsZDhl3QsTt6U2ZieZ88zd1bGiobXy9AT7vLYuZWn1X4_EmnC31UW8PLtc9qdxQvrWXi7ytf_6S5PE_dPUh7NaYlRxXTPYItmzxGB7cymT4BMZdVLoaET2ZqB-jSe0jRKaOIMAkc291G2yf-PNiMipI47VErpQZTUlReaPPid8XJpcrH0dGyijQq-WEqPJWRzKvMumunsKgdzronoX1RQ6h5oiPQpdTgWovzSMqmUmMcJRpYxOtUplEcYQmpU1j6px1sUi0U9Jn2ekI4QxNrGHPoFVMC_scCOIjnlChVd5RXEQmTwUaUAhZGePOpCoAup67TNdJzv1dG-OsPGznMsNxzHAcMz-OmR_HAN41n8yqDB93Eb_1z2o5n99F-HqD8OPpIOt-7t8QZDjFARysGetWlT7hDq76EQvgVfMaJ86f5KjCTpeeBplcIhSTAbxvGPJvfp-VfPZnyqzbH0YnPVz9o2T_n9p4AfexzCs_vQNoIZ_YQwRui_xlLZTXYkk-ug priority: 102 providerName: Unpaywall – databaseName: Wiley Online Library Open Access dbid: 24P link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3db9MwELe28QA8ID5FYJsMQjyADI7tOPHjiFYNpAIPnbQ3y5-iUptW6yrof885ScOqSQPxap-txHfn-9l3vkPojeLCVXmkhNqSEcGMIjYUkVBnnaKuAhlJ9x3jr_LsXHy5KC72UL19C9Plhxgu3JJmtPt1UnBjuyokAGqBidNwRVLAB1gw_oFKJffRnRzwTBJzJr5vt-OikG1FVzCTOQH4Xg2uTfXxxhQ7xmkfundw5911szSbn2Y220WyrSkaPUQPegyJTzqmP0J7oXmM7l_LLPgEzWowgg4QNp6bX9N5H7ODFxED4MOrdAr28Os4-W_xtMFDFBG-NH66wE0XHb7C6Z4W_9ikd124fZV5uZ5j01ZZxKsus-3mKZqMTif1GekLKxAnAK-QaKkEM1RZRhX3pZeRcudD6UylSlYwOOKFqqAxhljI0kWjUtabXMroaRk8f4YOmkUTniMMeEWUVDpjcyMk87aScKABCMm5iL4yGaLbBdWuTzqeal_MdOv8FkrDImvggU480IkHGXo3DFl2GTduI36b2nq9W91G-HqH8PPpRNffxn8I9NLHDB1uuX1typQAB3ZhxjP0augGxiXPimnCYp1oCpUyPucqQ-8HKfmXz-etHP2dUtfjc_ZpBLsxK1_816iX6B60iy5-7hAdgLyEIwBUV_a4VZjfAWgYrw priority: 102 providerName: Wiley-Blackwell |
| Title | Capacity maximisation of the secondary link in cognitive radio networks with hybrid spectrum access strategy |
| URI | http://digital-library.theiet.org/content/journals/10.1049/iet-com.2013.0696 https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-com.2013.0696 https://www.proquest.com/docview/1535276323 https://www.proquest.com/docview/1559690619 https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/iet-com.2013.0696 |
| UnpaywallVersion | publishedVersion |
| Volume | 8 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVBHI databaseName: IET Digital Library Open Access customDbUrl: eissn: 1751-8636 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0055644 issn: 1751-8636 databaseCode: IDLOA dateStart: 20130104 isFulltext: true titleUrlDefault: https://digital-library.theiet.org/content/collections providerName: Institution of Engineering and Technology – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1751-8636 dateEnd: 20141231 omitProxy: true ssIdentifier: ssj0055644 issn: 1751-8636 databaseCode: BENPR dateStart: 20070201 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1751-8636 dateEnd: 20140930 omitProxy: true ssIdentifier: ssj0055644 issn: 1751-8636 databaseCode: 8FG dateStart: 20070201 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1751-8636 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0055644 issn: 1751-8636 databaseCode: 24P dateStart: 20130101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwELdo-wB7QHxqGaMyCPEAMnMcx4kft9KyIVoq1ErjKXL8AZXatFqpoP895yTNVgmNvSRRcrFi38X3O_s-EHojI67T0FFC84QRzpQkuY0doTrXkuoUZMSvdwxH4nzKP1_Gl9fh0Wb2w9fKILsVN79abqvIA--6DfPwST3GVUESwLcnQEC85weosugDFVK0UIeBdc7aqHPx8Ys3saqZOY5FWdwVNGZIAMmnzS7nPxrZ01MteLwHQe9vipXa_lbz-T6oLbXS4BF6WMNJfFrx_zG6Z4sn6OBGksGnaN4DfagBbOOF-jNb1O47eOkwdBuvvUFsYBCw38rFswI3DkX4SpnZEheVo_ga-yVb_HPrQ7xwGaB5tVlgVRZcxOsqye32GZoM-pPeOalrLBDNAboQl1MBGinNGZWRSYxwNNLGJlqlMmExA2vPpjF1zrpYJNop6RPghEI4QxNroueoXSwLe4gwQBeeUKFVHioumMlTAbYNoMko4s6kKkB0N6CZrvOP-zIY86zcB-cyg0HOgAeZ50HmeRCgd80rqyr5xm3Eb_29nXjcRvh6j_CiP8l6X4fXBNnKuAAd77h9o0mfCwcmZBYF6FXzGBjnN1lUYZcbTxNLn_w5lAF630jJXT4_KuXo_5RZbzhlZwOYmFlydNdOv0AP4JpX3nPHqA0iYl8CnPqVd1GL8TEc08GnLuqc9Ufjb936z4HzdDQ-_f4X1mEfoQ |
| linkProvider | Institution of Engineering and Technology |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lj9MwELb2cVg4IJ4iuwsYBBxAYZ3EcZLDCrGlVctuC0JdaW-W44eo1Cal2Wrpj-O_Mc6L9lK47DWeOJFn7G_G80LodRJQGXuGuCSNfJf6InFTHRqXyFQmRMYgI_a-Yzhi_Uv65Sq82kG_m1wYG1bZnInlQa1yae_ITzxbhwQ2gx98nP90bdco611tWmiIurWCOi1LjNWJHed6dQMmXHE6-Az8fuP7ve6403frLgOupADerkkJgzM5Tn0w7lWkmCGBVDqSIk4iH77pRToOiTHahCySRiS2BIzHmFEk0iqAaXfRPg1oArbf_ll39O17AwVhyMpusgDRngumQ9y6VZOTib52bbwKAHDwgTDbNGANGHdheEPnPVhmc7G6EdPpphZdwmDvPrpX66_4UyVwD9COzh6iu2tVDR-haQcAWIJ2j2fi12RWxwvh3GBQNnFhLXAlFitsfcd4kuE2ggkvhJrkOKsi0wts74jxj5XNKcNlRuhiOcOi7PCIi6qq7uoxGt_Gcj9Be1me6acIg65EI8KkSD1Bma_SmIExBeprEFCjYuEg0iwol3XBc9t3Y8pLxztNOCwyBx5wywNueeCgd-0r86raxzbit_ZZveeLbYSvNggH3THvfB3-JeBzZRx03HB7bcpW6B30sh0Gxlmvjsh0vrQ0YWKrTXuJg963UvI_vx-UcvRvSt4ZXvpnPUACPzrc_psv0EF_PLzgF4PR-RG6A1PQKmDvGO2BkOhnoMFdp8_rfYIRv-Wd-QdljVUo |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEF61ReJxQDyFocCCgAOVyfq1tg8IQVrTUFI4pFJvq_U-RKTECXGjkp_Gv2PGL5JL4NKrd7y2dmb2m9mZnSHkVRqEKvEsc1ke-27oy9TNTWRdpnKVMpWAjOB5x_CUH5-FX86j8x3yu70Lg2mV7Z5YbdR6pvCMvOdhHRJQBj_o2SYt4vth9mH-08UOUhhpbdtp1CJyYlaX4L6V7weHwOvXvp8djfrHbtNhwFUhALdrc8ZhP05yHxx7HWtuWaC0iZVM0tiH73mxSSJmrbERj5WVKZZ_8Ti3msVGBzDtLrkWYxF3vKSefW5BIIp41UcWwNlzwWlIuoBq2hubCxczVQB6g3eMY7uANUjcheENa_fGspjL1aWcTDbt5woAszvkdmO50o-1qN0lO6a4R26t1TO8TyZ9gF4Fdj2dyl_jaZMpRGeWgplJS_S9tVysKEaN6bigXe4SXUg9ntGizkkvKZ4O0x8rvE1Gq7ugi-WUyqq3Iy3rerqrB2R0FYv9kOwVs8I8IhSspDBmXMnckyH3dZ5wcKPAcA2C0OpEOoS1CypUU-ocO25MRBVyD1MBiyyABwJ5IJAHDnnbvTKv63xsI36DzxptL7cRvtwgHByNRP_b8C-BmGvrkP2W22tTduLukBfdMDAO4zmyMLMl0kQp1pn2UoccdFLyP78fVHL0b0rRH575nzLAAD9-vP03n5ProI_i6-D05Am5CTOEdabePtkDGTFPwXS7yJ9VSkKJuGKl_AMFoVLC |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3db9MwED9t3QPwsPEpMjZkEOIBlM6NHSd-3KqVgdTBQyuNp8jxh1bRptXaCspfv3OSZitCAyTerORix_ad73f23RngjWRcpx1HQ5onUcgjJcPcxi6kOteS6hR5xO939M_F2ZB_uogvtuDDOhamyg_RbLh5ySjXay_gM-Oqdb6yOrk8GtlF6J0-UIuxNhVSbMOOiBGUt2BneP7l-GsZDhl3QsTt6U2ZieZ88zd1bGiobXy9AT7vLYuZWn1X4_EmnC31UW8PLtc9qdxQvrWXi7ytf_6S5PE_dPUh7NaYlRxXTPYItmzxGB7cymT4BMZdVLoaET2ZqB-jSe0jRKaOIMAkc291G2yf-PNiMipI47VErpQZTUlReaPPid8XJpcrH0dGyijQq-WEqPJWRzKvMumunsKgdzronoX1RQ6h5oiPQpdTgWovzSMqmUmMcJRpYxOtUplEcYQmpU1j6px1sUi0U9Jn2ekI4QxNrGHPoFVMC_scCOIjnlChVd5RXEQmTwUaUAhZGePOpCoAup67TNdJzv1dG-OsPGznMsNxzHAcMz-OmR_HAN41n8yqDB93Eb_1z2o5n99F-HqD8OPpIOt-7t8QZDjFARysGetWlT7hDq76EQvgVfMaJ86f5KjCTpeeBplcIhSTAbxvGPJvfp-VfPZnyqzbH0YnPVz9o2T_n9p4AfexzCs_vQNoIZ_YQwRui_xlLZTXYkk-ug |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Capacity+maximisation+of+the+secondary+link+in+cognitive+radio+networks+with+hybrid+spectrum+access+strategy&rft.jtitle=IET+communications&rft.au=Tan%2C+Xiaobo&rft.au=Zhang%2C+Hang&rft.au=Hu%2C+Jian&rft.date=2014-03-01&rft.pub=The+Institution+of+Engineering+and+Technology&rft.issn=1751-8628&rft.eissn=1751-8636&rft.volume=8&rft.issue=5&rft.spage=689&rft.epage=696&rft_id=info:doi/10.1049%2Fiet-com.2013.0696&rft.externalDocID=10_1049_iet_com_2013_0696 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8628&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8628&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8628&client=summon |