Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058219
Sukanta Das, Rakesh Kumar
In this paper, space vector pulse width modulation (SVPWM) scheme for voltage fed inverter (VFI) using conventional method and artificial neural network (ANN) based approach are presented separately. In the conventional method, the difficulty of explicitly expressing cross-over and holding-angle as a function of modulation factor in overmodulation mode-I and mode-II respectively are overcome by introducing Newton's Forward Interpolation (NFI). This greatly simplifies the implementation of conventional SVPWM technique without compromising the accuracy issue. The SVPWM is further implemented by ANN based approach built with three subnets to account for three regions of inverter operation distinctly. In comparison to a single ANN taking care of all the three regions, this apparent redundancy of subnets markedly reduces the error in calculating turn-on time for inverter switches. The performances of these two schemes are quantitatively expressed by total harmonic distortion in motor phase current by simulation in Matlab. The results show that ANN based approach shows a comparable performance with that of the conventional approach.
{"title":"A comparative performance assessment of conventional and ANN based SVPWM controller for VFI induction motor drive","authors":"Sukanta Das, Rakesh Kumar","doi":"10.1109/SPACES.2015.7058219","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058219","url":null,"abstract":"In this paper, space vector pulse width modulation (SVPWM) scheme for voltage fed inverter (VFI) using conventional method and artificial neural network (ANN) based approach are presented separately. In the conventional method, the difficulty of explicitly expressing cross-over and holding-angle as a function of modulation factor in overmodulation mode-I and mode-II respectively are overcome by introducing Newton's Forward Interpolation (NFI). This greatly simplifies the implementation of conventional SVPWM technique without compromising the accuracy issue. The SVPWM is further implemented by ANN based approach built with three subnets to account for three regions of inverter operation distinctly. In comparison to a single ANN taking care of all the three regions, this apparent redundancy of subnets markedly reduces the error in calculating turn-on time for inverter switches. The performances of these two schemes are quantitatively expressed by total harmonic distortion in motor phase current by simulation in Matlab. The results show that ANN based approach shows a comparable performance with that of the conventional approach.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116672636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058242
R. Singha, D. Vakula
This paper describes a corrugated antipodal Vivaldi antenna with improved performance by using negative index metamaterial (NIM) of the Archimedean spiral design. A single layer NIM piece is placed perpendicular middle of the two arm of the proposed antenna. The antenna size is 30×60×0.787 mm3 operating at 8GHz. The simulated results of NEVI corrugated antipodal Vivaldi antenna show that the gain and directivity has increased up to 1.2dB and 1dB respectively. The HPBW is increased by 90 with the reflection coefficient less than DIO dB from 4.7 GHz to 11 GHz for UWB application.
{"title":"Corrugated antipodal Vivaldi antenna using spiral shape negative index metamaterial for ultra-wideband application","authors":"R. Singha, D. Vakula","doi":"10.1109/SPACES.2015.7058242","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058242","url":null,"abstract":"This paper describes a corrugated antipodal Vivaldi antenna with improved performance by using negative index metamaterial (NIM) of the Archimedean spiral design. A single layer NIM piece is placed perpendicular middle of the two arm of the proposed antenna. The antenna size is 30×60×0.787 mm3 operating at 8GHz. The simulated results of NEVI corrugated antipodal Vivaldi antenna show that the gain and directivity has increased up to 1.2dB and 1dB respectively. The HPBW is increased by 90 with the reflection coefficient less than DIO dB from 4.7 GHz to 11 GHz for UWB application.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121739040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058275
A. Parmar, S. Gulia, S. Bajaj, V. Gambhir, R. Sharma, M. Reddy
Continuous use of explosives by terrorists throughout the world has led to the great necessity in explosives detection technology, especially in technologies that have potential for stand-off detection. The Raman vibrational spectrum of molecules provides an excellent fingerprint for species identification. Analysis of Raman signatures manually is time-consuming and cannot be afford by security personal in real scenario. Automation of detection, acquisition and analysis of Raman signal is required for operations in real scenario. In this work, we have developed software which caters all these process automatically and finally mentions name of material under observation for standoff detection. This is based on continuous wavelet transformation (CWT). This algorithm/ software is capable of identifications/ discrimination of very similar chemicals like trinitrobenzene (TNB), trinitrotoluene (TNT) and dinitrotoluene (DNT).
{"title":"Signal processing of Raman signatures and realtime identification of hazardous molecules using continuous wavelet transformation (CWT)","authors":"A. Parmar, S. Gulia, S. Bajaj, V. Gambhir, R. Sharma, M. Reddy","doi":"10.1109/SPACES.2015.7058275","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058275","url":null,"abstract":"Continuous use of explosives by terrorists throughout the world has led to the great necessity in explosives detection technology, especially in technologies that have potential for stand-off detection. The Raman vibrational spectrum of molecules provides an excellent fingerprint for species identification. Analysis of Raman signatures manually is time-consuming and cannot be afford by security personal in real scenario. Automation of detection, acquisition and analysis of Raman signal is required for operations in real scenario. In this work, we have developed software which caters all these process automatically and finally mentions name of material under observation for standoff detection. This is based on continuous wavelet transformation (CWT). This algorithm/ software is capable of identifications/ discrimination of very similar chemicals like trinitrobenzene (TNB), trinitrotoluene (TNT) and dinitrotoluene (DNT).","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128006540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058291
G. Raghavendra, P. Krishna
Today IT is faced with the challenge of trying to respond to rapidly changing business environments on limited budgets, needing to support legacy applications as well as new modern software applications. Cloud computing offers substantial benefits in terms of agility and cost-effectiveness but cloud platforms are not commodities, with one easily substituted for another. Today, most companies want and need to have both onsite and offsite IT environments. Most cloud offerings, though, are only designed to run new applications, not support older legacy ones. This paper briefly outlines different aspects which are helpful for fast computing and major factors that dominate the future computing world and also describes about innovation cycle in IT Sector.
{"title":"Innovation in IT sector and future advances in cloud computing","authors":"G. Raghavendra, P. Krishna","doi":"10.1109/SPACES.2015.7058291","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058291","url":null,"abstract":"Today IT is faced with the challenge of trying to respond to rapidly changing business environments on limited budgets, needing to support legacy applications as well as new modern software applications. Cloud computing offers substantial benefits in terms of agility and cost-effectiveness but cloud platforms are not commodities, with one easily substituted for another. Today, most companies want and need to have both onsite and offsite IT environments. Most cloud offerings, though, are only designed to run new applications, not support older legacy ones. This paper briefly outlines different aspects which are helpful for fast computing and major factors that dominate the future computing world and also describes about innovation cycle in IT Sector.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121925593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058254
Prasad Rayi, M. Prasad, P. Kishore
In this paper we presented limited feedback schemes for Multi user-Multiple Input and Multiple Output (MU-MIMO) transmit antenna downlink systems. We investigate performance analysis of the feedback strategies based on the knowledge of channel state information (CSI) at base station (BS). it can be most desirable to generate high sum capacity, thus there is a constraint on total feedback load and per user feedback bits. It can be extensively evaluated the ZFRVQ, RBF and PU2RC feedback algorithms for sum rate analysis. The channel model considers as AWGN and Rayleigh fading model. The combination of multi-user feedback methods and multiple antennas' can enhance the sum capacity of MU-MIMO systems. In order to achieve high capacity thus, the system requires perfect CSI. Our system model presented to obtain high-quality feedback with the strong priority and also achieving larger sum rate with limited number of antenna's from each one of the receivers. We produced larger capacity more effectively and efficiently, instead of capturing a few feedback bits from more users. This implies that the system design, correlates very strongly for achieving larger sum capacity with CSI from MS's or users, Hence there is a tradeoff between total feedback load to the sum rate of the system. The Simulation results presented here are subjected to Monte Carlo simulation with MATLAB 2013a.
{"title":"Modelling, simulation of multi-user grouping considering channel states in MIMO systems","authors":"Prasad Rayi, M. Prasad, P. Kishore","doi":"10.1109/SPACES.2015.7058254","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058254","url":null,"abstract":"In this paper we presented limited feedback schemes for Multi user-Multiple Input and Multiple Output (MU-MIMO) transmit antenna downlink systems. We investigate performance analysis of the feedback strategies based on the knowledge of channel state information (CSI) at base station (BS). it can be most desirable to generate high sum capacity, thus there is a constraint on total feedback load and per user feedback bits. It can be extensively evaluated the ZFRVQ, RBF and PU2RC feedback algorithms for sum rate analysis. The channel model considers as AWGN and Rayleigh fading model. The combination of multi-user feedback methods and multiple antennas' can enhance the sum capacity of MU-MIMO systems. In order to achieve high capacity thus, the system requires perfect CSI. Our system model presented to obtain high-quality feedback with the strong priority and also achieving larger sum rate with limited number of antenna's from each one of the receivers. We produced larger capacity more effectively and efficiently, instead of capturing a few feedback bits from more users. This implies that the system design, correlates very strongly for achieving larger sum capacity with CSI from MS's or users, Hence there is a tradeoff between total feedback load to the sum rate of the system. The Simulation results presented here are subjected to Monte Carlo simulation with MATLAB 2013a.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116352148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058206
H. J. Mahanta, Abul Kalam Azad, Ajoy Kumar Khan
A major breakthrough in side channel attacks came up when analysis of power consumption by a cryptographic device led to discovery of the secret key. This analysis technique popularly known as Power Analysis Attack is now one of the most volatile and successful side channel attacks. This technique uses the power consumed by a cryptographic system as the main parameter to identify the cryptographic algorithms as well as the secret key used. The power traces of the system are statistically analyzed and the correlation between these traces and the cryptographic technique is explored to break the security. This attack has been successfully carried out on various cryptographic algorithms like DES, AES, RSA and ECC which are implemented on cryptographic devices such smart cards, FPGA, DSP, ASIC etc. In this paper we present a review on the power analysis attack and its techniques. Also, a brief detail on some of the power analysis attacks on smart card and FPGA have been presented. Couple of methods to improve such attacks has also been mentioned.
{"title":"Power analysis attack: A vulnerability to smart card security","authors":"H. J. Mahanta, Abul Kalam Azad, Ajoy Kumar Khan","doi":"10.1109/SPACES.2015.7058206","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058206","url":null,"abstract":"A major breakthrough in side channel attacks came up when analysis of power consumption by a cryptographic device led to discovery of the secret key. This analysis technique popularly known as Power Analysis Attack is now one of the most volatile and successful side channel attacks. This technique uses the power consumed by a cryptographic system as the main parameter to identify the cryptographic algorithms as well as the secret key used. The power traces of the system are statistically analyzed and the correlation between these traces and the cryptographic technique is explored to break the security. This attack has been successfully carried out on various cryptographic algorithms like DES, AES, RSA and ECC which are implemented on cryptographic devices such smart cards, FPGA, DSP, ASIC etc. In this paper we present a review on the power analysis attack and its techniques. Also, a brief detail on some of the power analysis attacks on smart card and FPGA have been presented. Couple of methods to improve such attacks has also been mentioned.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126073625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058200
S. K. L. V. Sai Prakash, J. Lakshmi
A novel recursive algorithm for estimating the carrier frequency offset (CFO) is presented which is compared against a basic maximum likelihood (ML) algorithm for orthogonal frequency division multiplexing (OFDM) scheme. Cyclic prefix (CP) is used for estimating the offset which enables the estimation without additional sequences. The recursive algorithm reduces the buffer size of the system by updating the value of offset to the present estimate. A weighted variable is taken for updating the previous offset. Simulations are done for comparing the length of prefix to be used for better estimation accuracy. Results show that the recursive algorithm has better performance than the ML estimator.
{"title":"Carrier frequency offset estimation using novel recursive algorithm for OFDM downlink","authors":"S. K. L. V. Sai Prakash, J. Lakshmi","doi":"10.1109/SPACES.2015.7058200","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058200","url":null,"abstract":"A novel recursive algorithm for estimating the carrier frequency offset (CFO) is presented which is compared against a basic maximum likelihood (ML) algorithm for orthogonal frequency division multiplexing (OFDM) scheme. Cyclic prefix (CP) is used for estimating the offset which enables the estimation without additional sequences. The recursive algorithm reduces the buffer size of the system by updating the value of offset to the present estimate. A weighted variable is taken for updating the previous offset. Simulations are done for comparing the length of prefix to be used for better estimation accuracy. Results show that the recursive algorithm has better performance than the ML estimator.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127763544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058212
V. Arora, Ravibabu Mulaveesala, G. Subbarao
This contribution demonstrates an application of non-stationary frequency modulated thermal wave imaging technique for the numerical characterization of a mild steel sample containing random shape defects. Frequency and time domain based phase analysis schemes are implemented on the recorded thermal profiles and their detectabilities are compared by taking signal to noise ratio into consideration.
{"title":"Non-destructive testing of steel sample by non-stationary thermal wave imaging","authors":"V. Arora, Ravibabu Mulaveesala, G. Subbarao","doi":"10.1109/SPACES.2015.7058212","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058212","url":null,"abstract":"This contribution demonstrates an application of non-stationary frequency modulated thermal wave imaging technique for the numerical characterization of a mild steel sample containing random shape defects. Frequency and time domain based phase analysis schemes are implemented on the recorded thermal profiles and their detectabilities are compared by taking signal to noise ratio into consideration.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127344087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058205
K. Manjunath, K. S. Rao, M. G. Reddy
The goal of this work is to improve phone recognition accuracy using combination of source and system features. As speech is produced by exciting time varying vocal tract system with time varying excitation, we want to explore both source and system components of speech production system for phone recognition. The excitation source information is derived by processing linear prediction residual of speech signal. Mel-frequency cepstral coefficient features are used for capturing vocal tract information. The Phone Recognition Systems (PRSs) are developed using hidden Markov models. The proposed PRSs are developed for English and an Indian language Bengali using TEVIIT and Phonetic, Prosodically Rich Transcribed speech corpora, respectively. We have also developed tandem PRSs using the phone posteriors obtained from feedforward neural networks. The tandem PRSs developed using combination of excitation source and system features, outperform the conventional tandem systems developed using system features alone.
{"title":"Improvement of phone recognition accuracy using source and system features","authors":"K. Manjunath, K. S. Rao, M. G. Reddy","doi":"10.1109/SPACES.2015.7058205","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058205","url":null,"abstract":"The goal of this work is to improve phone recognition accuracy using combination of source and system features. As speech is produced by exciting time varying vocal tract system with time varying excitation, we want to explore both source and system components of speech production system for phone recognition. The excitation source information is derived by processing linear prediction residual of speech signal. Mel-frequency cepstral coefficient features are used for capturing vocal tract information. The Phone Recognition Systems (PRSs) are developed using hidden Markov models. The proposed PRSs are developed for English and an Indian language Bengali using TEVIIT and Phonetic, Prosodically Rich Transcribed speech corpora, respectively. We have also developed tandem PRSs using the phone posteriors obtained from feedforward neural networks. The tandem PRSs developed using combination of excitation source and system features, outperform the conventional tandem systems developed using system features alone.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128416584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058201
K. Annapurna, B. Seetharamanjaneyu, S. Parveen, Avireni Rukmini, Srinivasulu
While designing the cognitive radio networks, enough care would be taken to safeguard the transmissions of primary users so that their quality of service (QoS) is not affected by the transmissions of secondary users. Opportunistic access of the spectrum is permitted to secondary users, through which the vacant channels of the spectrum are used by secondary users on temporary basis. In this mode, when the primary user of that channel returns back for transmission/ reception, the secondary user has to vacate that channel. If that secondary user is engaged in transmitting delay-sensitive (real-time) data, it will lead to severe degradation of its QoS due to this channel quitting requirement. In such instances, if another vacant channel of the spectrum can readily be offered to this secondary user, the device will be able to satisfy its real-time transmission requirements. For this to happen, appropriate categorization of secondary user traffic based on their real-time needs, and planning the usage of vacant channels based on the importance of data from various secondary users are needed. These mechanisms are proposed in this work Simulation studies of the proposed mechanisms show that the blocking probabilities of real-time data secondary devices are much lesser compared to other devices.
{"title":"Supporting real-time traffic in cognitive radio networks","authors":"K. Annapurna, B. Seetharamanjaneyu, S. Parveen, Avireni Rukmini, Srinivasulu","doi":"10.1109/SPACES.2015.7058201","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058201","url":null,"abstract":"While designing the cognitive radio networks, enough care would be taken to safeguard the transmissions of primary users so that their quality of service (QoS) is not affected by the transmissions of secondary users. Opportunistic access of the spectrum is permitted to secondary users, through which the vacant channels of the spectrum are used by secondary users on temporary basis. In this mode, when the primary user of that channel returns back for transmission/ reception, the secondary user has to vacate that channel. If that secondary user is engaged in transmitting delay-sensitive (real-time) data, it will lead to severe degradation of its QoS due to this channel quitting requirement. In such instances, if another vacant channel of the spectrum can readily be offered to this secondary user, the device will be able to satisfy its real-time transmission requirements. For this to happen, appropriate categorization of secondary user traffic based on their real-time needs, and planning the usage of vacant channels based on the importance of data from various secondary users are needed. These mechanisms are proposed in this work Simulation studies of the proposed mechanisms show that the blocking probabilities of real-time data secondary devices are much lesser compared to other devices.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122757105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}