Skip to main content

Cooperative Spectrum Sensing with Data Mining of Multiple Users’ Historical Sensing Data

Cooperative Spectrum Sensing with Data Mining of
Multiple Users’ Historical Sensing Data
ABSTRACT:
                           The current cooperative spectrum sensing still can not effectively exploit the temporal correlations among sensing data, especially the correlations between the current sensing data and the historical data.
      This paper uses sticky hierarchical Dirichlet process-hidden Markov model to exploit the historical sensing data of multiple users, and classifies the historical sensing data into groups according to their latent spectrum states.
       The proposed spectrum sensing algorithm can fuse the historical sensing data into prior knowledge, which can be used to improve the accuracy in spectrum decision.
       Furthermore, a rejection process is proposed to filter out some sensing data with high uncertainty in classification, which guarantees the effectiveness of historical sensing data.

EXIXTING SYSTEM:
                 Furthermore, the  sequential spectrum sensing data are temporally correlated, which means their spectrum states may keep consistent in high probability.
      The historical sensing data will be classified according to their statistical property, and some historical sensing data that can not be classified clearly will be rejected through rejection process.
      Due to the uncertainty of spectrum sensing data, the rejection process is proposed to remove uncorrelated spectrum sensing data, in order to ensure the effectiveness of Bayesian inference.
      Historical sensing data are fused into prior knowledge using sticky HDP-HMM, where temporal correlation and statistical correlation are exploited, in order to reduce the uncertainty of current spectrum sensing and improve the accuracy of spectrum decision.
PROPOSED SYSTEM:
                 In this paper, a novel cooperative spectrum sensing algorithm has been proposed, where the sticky HDP-HMM model is adopted to exploit the historical sensing data.
      The historical sensing data has been refined through rejection process, in order to filter out some sensing data with high uncertainty.
      In the proposed cooperative spectrum sensing algorithm, the CRF-LC model could achieve the exploitation of the temporal correlations among sensing data, and thus the spectrum decision performance can be improved.
      The proposed algorithm has more than 10%, 60%, 5% detection probability improvement under false alarm probability 0.2, compared with centralized spectrum sensing algorithm, Consensus spectrum sensing algorithm and DP-based spectrum sensing algorithm, respectively.
HARDWARE REQUIREMENTS:
      Processor             -        Pentium –III
       Speed                  -        1.1 Ghz
       RAM                   -        256 MB(min)
       Hard Disk           -         20 GB
       Key Board           -        Standard Windows                                                          Keyboard
      Mouse                  -        Two or Three Button Mouse
      Monitor                -        SVGA
SOFTWARE REQUIREMENTS:
                Tool                    -        MATLAB R2012
      Operating system    -       Windows Xp, 7
REFERENCES:
          H. Ning, H. Liu, J. Ma, L.T. Yang, Y. Wan, X. Ye, and R.Huang, “From Internet to Smart World,” IEEE Access, vol.3, pp. 1994-1999, Aug. 2015.
      C. Thomes, “The National Broadband Plan: Connecting America,” Government information quarterly, vol. 28,  no. 3, pp. 435-436, Jul. 2011.
      J. Mitola III, “Cognitive Radio for Flexible Mobile Multimedia Communications,” Mobile Networks and Applications, vol. 6, no. 5, pp. 435-441, Sep. 2006.








Comments

Popular posts from this blog

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD report

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD ABSTRACT More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity checking is also an important security problem in public cloud storage. It makes the clients check whether their outsourced data is kept intact without downloading the whole data. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, system model and se...

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM ABSTRACT Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as”the weakest link” in the authentication chain. Rather than arbitrary alphanumeric strings, users tend to choose passwords either short or meaningful for easy memorization. With web applications and mobile apps piling up, people can access these applications anytime and anywhere with various devices. This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, we proposed a novel authentication system PassMatrix, based on graphical passwords to resist shoulder surfing attacks. With a one-time valid login indicator and ...

garbage monitoring using arduino code with gsm

#include <SoftwareSerial.h> #include <LiquidCrystal.h> //LiquidCrystal lcd(7, 6, 5, 4, 3, 2); LiquidCrystal lcd(13, 12, 11, 10, 9, 8); SoftwareSerial mySerial(0,1); #define trigPin 2 #define echoPin 3 #define PIR_sensor 4 #define m11 5 #define m12 6 void setup() {    lcd.begin(16, 2);    lcd.print("    Garbage    ");    Serial.println("garbage ");   lcd.setCursor(0,1);   lcd.print("   Open Close    ");   Serial.println(" open close");   delay(3000);   lcd.clear();   //lcd.print(" ");   delay(2000); mySerial.begin(9600); // Setting the baud rate of GSM Module Serial.begin (9600); pinMode(trigPin, OUTPUT); pinMode(echoPin, INPUT);  pinMode(m11, OUTPUT);   pinMode(m12, OUTPUT);   } void loop() {  readPIR();  pingDist();  SendMessage(); } void pingDist ()   {     long duration, distance;...