Opportunity spectrum access method based on sideband observation information multi-arm tiger machine model

A spectrum access technology, applied in wireless communication, transmission monitoring, electrical components, etc., can solve the problems of low channel sensing and access process balance efficiency, poor adaptability to the actual environment, poor statistical characteristics, etc., to achieve efficient dynamic Effects of Channel Awareness and Opportunistic Access Methods

Inactive Publication Date: 2019-10-18
NAT INNOVATION INST OF DEFENSE TECH PLA ACAD OF MILITARY SCI +1
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Poor adaptability to the actual environment
Most of the existing methods are perceptual access methods when the statistical information is known, and they cannot run in problems where the statistical information is unknown or difficult to obtain in time
The premise of existing methods is the consistency of sensing and accessing channels, that is, the number of sensing and accessing channels is the same, but in reality, the large difference between the received and transmitted energy of the secondary user makes there exist multiple sensing channels under the condition of limited power energy. channel, select the case of accessing the preferred part of the channel, the traditional method does not consider this case
[0006] 2. The method has poor asymptotic statistical properties
Restricted by the statistical model, the optimal performance is mainly based on the cumulative gain loss as a time logarithmic function, the balance efficiency of the channel sensing and access process is not high, and the characteristics of practical problems are insufficiently studied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Opportunity spectrum access method based on sideband observation information multi-arm tiger machine model
  • Opportunity spectrum access method based on sideband observation information multi-arm tiger machine model
  • Opportunity spectrum access method based on sideband observation information multi-arm tiger machine model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0056] combine figure 1 , a method of opportunistic spectrum access based on a sideband observation information multi-armed bandit model in the present invention, characterized in that it comprises the following steps:

[0057] Step 1. For the secondary user access problem when the channel information of the cognitive network is unknown and the channel perception is not perfect, the detection and perception of N channels will be carried out, and the problem of selecting a channel suitable for access is modeled as the MABP-SI model. for:

[0058] combine figure 2 , secondary users in the cognitive network perform dynamic channel access according to authorized user time slots. Within a time slot, secondary users can perceive all authorized channels in the network; the time for channel sensing access is divided into time slots, and the duration is T; the network has N authorized users, which are respectively recorded as channels 1, 2, ..., N, such as image 3 As shown, for e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an opportunity spectrum access method based on a sideband observation information multi-arm tiger machine model. The method comprises the following steps: firstly, aiming at asecondary user access problem under the conditions that cognitive network channel information is unknown and channel perception is imperfect, carrying out detection perception on N channels, and selecting a channel problem suitable for access to be modeled as MABP-SI model; sensing all authorized channels by a secondary user, recording a sensing observation result, updating a probability vector, and recording a channel set which is sensed to be idle; creating a candidate set of spatial probability vector estimated values, and selecting an estimated value of an idle probability vector; judgingwhether the idle channel set is empty or not at the time slot t: if the set is empty, not accessing the secondary user to any channel, and if the set is not empty, selecting k authorized channels withthe maximum coefficient to access; and finally, updating t to t + 1, and circulating. According to the method, the income loss of channel access under the statistical asymptotic condition is reduced,and the method has the advantage of statistical asymptotic effectiveness.

Description

technical field [0001] The invention relates to the technical field of spectrum access, in particular to an opportunistic spectrum access method based on a sideband observation information multi-armed bandit model. Background technique [0002] In recent years, with the rapid development of wireless networks, spectrum resources are more congested and the frequency conflict of low utilization is becoming more and more prominent. How to improve the utilization of current resources through spectrum opportunity access has become a research hotspot. The core idea of ​​spectrum opportunistic access is that in cognitive wireless networks, secondary users can use their real-time spectrum sensing capabilities to identify and prioritize idle channels for opportunistic access based on the sensing results without affecting the normal work of spectrum licensed users. , in order to achieve the purpose of improving spectrum utilization and effectively alleviate the problem of scarcity of w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W74/08H04B17/318H04B17/336H04B17/391
CPCH04B17/318H04B17/336H04B17/391H04W74/08
Inventor 张周邓宝松赵维维闫野蒋品付军峰
Owner NAT INNOVATION INST OF DEFENSE TECH PLA ACAD OF MILITARY SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products