F. A. Khan, K. Tourki, Mohamed-Slim Alouini, K. Qaraqe
{"title":"Outage and SER performance of an opportunistic multi-user underlay cognitive network","authors":"F. A. Khan, K. Tourki, Mohamed-Slim Alouini, K. Qaraqe","doi":"10.1109/DYSPAN.2012.6478151","DOIUrl":null,"url":null,"abstract":"Consider a multi-user underlay cognitive network where multiple cognitive users concurrently share the spectrum with a primary network and a single secondary user is selected for transmission. The channel is assumed to have independent but not identical Nakagami-m fading. Closed form expressions for the outage performance and the symbol-error-rate performance of the opportunistic multi-user secondary network are derived when a peak interference power constraint is imposed on the secondary network in addition to the limited peak transmit power of each secondary user.","PeriodicalId":224818,"journal":{"name":"2012 IEEE International Symposium on Dynamic Spectrum Access Networks","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Symposium on Dynamic Spectrum Access Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DYSPAN.2012.6478151","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Consider a multi-user underlay cognitive network where multiple cognitive users concurrently share the spectrum with a primary network and a single secondary user is selected for transmission. The channel is assumed to have independent but not identical Nakagami-m fading. Closed form expressions for the outage performance and the symbol-error-rate performance of the opportunistic multi-user secondary network are derived when a peak interference power constraint is imposed on the secondary network in addition to the limited peak transmit power of each secondary user.