Optimal Harvest-or-Transmit Strategy for Energy Harvesting Underlay Cognitive Radio Network

05/05/2018
by   Kalpant Pathak, et al.
0

An underlay cognitive radio network with energy harvesting is considered which operates in slotted fashion. The primary user (PU) transmits with a constant power in each slot, while the secondary user (SU) either harvests energy from primary's transmission or transmits its data. We propose an optimal offline harvest-or-transmit strategy where in each slot, SU takes a decision whether to harvest energy or transmit its data limiting interference at the primary receiver. We aim to maximize the achievable rate of SU under energy causality and interference constraints. The optimization problem is formulated as a mixed integer non-linear program and the optimal harvest-or-transmit policy is obtained using generalized Benders decomposition algorithm. Through simulations, we analyze the effects of various system parameters and interference constraint at the primary receiver on the optimal policy.

READ FULL TEXT

page 1

page 2

page 3

page 5

research
06/03/2019

Harvest-or-Transmit Policy for Cognitive Radio Networks: A Learning Theoretic Approach

We consider an underlay cognitive radio network where the secondary user...
research
04/24/2018

Optimal User Scheduling in Energy Harvesting Wireless Networks

We consider a wireless network where multiple energy harvesting transmit...
research
03/15/2019

Power Control and Frequency Band Selection Policies for Underlay MIMO Cognitive Radio

We study power control and frequency band selection policies for multi-b...
research
01/11/2019

Mitigating Jamming Attacks Using Energy Harvesting

The use of energy harvesting as a counter-jamming measure is investigate...
research
04/13/2021

No-Pain No-Gain: DRL Assisted Optimization in Energy-Constrained CR-NOMA Networks

This paper applies machine learning to optimize the transmission policy ...
research
01/24/2018

Optimal Spectrum Sharing with ARQ based Legacy Users via Chain Decoding

This paper investigates the design of access policies in spectrum sharin...

Please sign up or login with your details

Forgot password? Click here to reset