Pub Date : 2016-12-01DOI: 10.1109/SCORED.2016.7810089
Wan Norhisyam Abd Rashid, E. J. Mohamad, R. Abdul Rahim, J. Abdullah, H. Ameran, Swee Leong Kok, M. R. Sapiee, Shahrizal Saat, A. Subki
It is very important to verify the gold content of karat-gold jewelry in order to avoid fraud and to guarantee the identity and the integrity of a gold bar. There are quite a number of techniques which are used to verify the gold content. Gold testing methods such as fire assay, touchstone testing and hydrostatic weighing have been used since the early civilization. In this paper, a conceptual framework for a non-destructive test to check gold content using parallel plate electrical capacitance tomography is being proposed. At the early stage, the possibility of using this method is being simulated using Comsol Multiphysic software. A complete design of a system is yet to be designed which include the sensor design, the main controller unit design and the method of reconstructing the image from the collected data. The simulation process has shown promising results to make this concept works. When a material is placed between the parallel plates, the permittivity distribution can be observed and based on the distribution, image of object can be reconstructed. Furthermore, there are significant results when the size and the permittivity of the object are varies.
{"title":"Design of non-destructive test on gold metal using parallel plate capacitance sensor: A conceptual framework","authors":"Wan Norhisyam Abd Rashid, E. J. Mohamad, R. Abdul Rahim, J. Abdullah, H. Ameran, Swee Leong Kok, M. R. Sapiee, Shahrizal Saat, A. Subki","doi":"10.1109/SCORED.2016.7810089","DOIUrl":"https://doi.org/10.1109/SCORED.2016.7810089","url":null,"abstract":"It is very important to verify the gold content of karat-gold jewelry in order to avoid fraud and to guarantee the identity and the integrity of a gold bar. There are quite a number of techniques which are used to verify the gold content. Gold testing methods such as fire assay, touchstone testing and hydrostatic weighing have been used since the early civilization. In this paper, a conceptual framework for a non-destructive test to check gold content using parallel plate electrical capacitance tomography is being proposed. At the early stage, the possibility of using this method is being simulated using Comsol Multiphysic software. A complete design of a system is yet to be designed which include the sensor design, the main controller unit design and the method of reconstructing the image from the collected data. The simulation process has shown promising results to make this concept works. When a material is placed between the parallel plates, the permittivity distribution can be observed and based on the distribution, image of object can be reconstructed. Furthermore, there are significant results when the size and the permittivity of the object are varies.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"319 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80183092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/SCORED.2016.7810036
Farah Raisa, Asif Reza, K. Abdullah
The future generations of mobile wireless systems such as the 5G technology are expected to be available due to huge demand on network capacity, better end-to-end performance, high mobility and high data rates. Inter-cell interference (ICI) management is one of the paramount issues that should be concerned in multi-tier Heterogeneous Networks (HetNets). Frequency reuse, successive interference cancellation techniques and coordinated multipoint transmissions (CoMP) are some of the popular interference cancellation schemes for mobile wireless networks. However, implementing these methods to the 5G standards with huge network size and capacity is a major challenge in the upcoming decades. In this paper, an extensive qualitative survey on different schemes of interference reduction is provided along with their performance, effectiveness and deficiencies. Key challenges and some guidelines to rework and overcome the shortcomings of the existing schemes are also discussed.
{"title":"Advanced inter-cell interference management technologies in 5G wireless Heterogeneous Networks (HetNets)","authors":"Farah Raisa, Asif Reza, K. Abdullah","doi":"10.1109/SCORED.2016.7810036","DOIUrl":"https://doi.org/10.1109/SCORED.2016.7810036","url":null,"abstract":"The future generations of mobile wireless systems such as the 5G technology are expected to be available due to huge demand on network capacity, better end-to-end performance, high mobility and high data rates. Inter-cell interference (ICI) management is one of the paramount issues that should be concerned in multi-tier Heterogeneous Networks (HetNets). Frequency reuse, successive interference cancellation techniques and coordinated multipoint transmissions (CoMP) are some of the popular interference cancellation schemes for mobile wireless networks. However, implementing these methods to the 5G standards with huge network size and capacity is a major challenge in the upcoming decades. In this paper, an extensive qualitative survey on different schemes of interference reduction is provided along with their performance, effectiveness and deficiencies. Key challenges and some guidelines to rework and overcome the shortcomings of the existing schemes are also discussed.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"21 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72652556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/SCORED.2016.7810061
W. Astuti, E. Byan Wahyu Riyandwita
A vehicle key provides the main functions for accessing the vehicle, accessing the ignition mechanism, and the ability to actually start the car. Voice based starting engine access control system potentially replaces these main functions by replacing the key with the specific user voice. In the proposed system, the access may be authorized simply by means of an enrolled user speaking into a microphone attached to the system. The proposed system then will decide whether the word is `On' or `Off'. The decision voice will be sent to Arduino in order to activate the automotive relay, which will be used to activate the engine's motor starter. Furthermore, the intelligent system approach is used to develop authorized words model based on the voice. Particularly Support Vector Machines based classification system is used in the proposed system to identify the authorized words. Experimental results confirm the effectiveness of the proposed intelligent Automatic voice-based starting engine access control system based on Mel-Frequency Ceptral Coefficient (MFCC) and Support Vector Machines (SVMs), since it resulting the training and testing accuracy of 100% and 92.15%, respectively.
{"title":"Intelligent automatic starting engine based on voice recognition system","authors":"W. Astuti, E. Byan Wahyu Riyandwita","doi":"10.1109/SCORED.2016.7810061","DOIUrl":"https://doi.org/10.1109/SCORED.2016.7810061","url":null,"abstract":"A vehicle key provides the main functions for accessing the vehicle, accessing the ignition mechanism, and the ability to actually start the car. Voice based starting engine access control system potentially replaces these main functions by replacing the key with the specific user voice. In the proposed system, the access may be authorized simply by means of an enrolled user speaking into a microphone attached to the system. The proposed system then will decide whether the word is `On' or `Off'. The decision voice will be sent to Arduino in order to activate the automotive relay, which will be used to activate the engine's motor starter. Furthermore, the intelligent system approach is used to develop authorized words model based on the voice. Particularly Support Vector Machines based classification system is used in the proposed system to identify the authorized words. Experimental results confirm the effectiveness of the proposed intelligent Automatic voice-based starting engine access control system based on Mel-Frequency Ceptral Coefficient (MFCC) and Support Vector Machines (SVMs), since it resulting the training and testing accuracy of 100% and 92.15%, respectively.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"103 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72912803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/SCORED.2016.7810052
Penny Chong, Yong Haur Tay
This paper focuses on developing a stable pedestrian detection and tracking algorithm. Although Histogram of Oriented Gradients (HOG) features are the best representation for human shapes, computing these feature vectors are computationally expensive as it slows down the overall detection process. Hence with the use of cascade of boosted classifiers, the overall process was shortened significantly even in the absence of graphics processing unit (GPU). Along with Kalman filter approach, the algorithm achieved desirable results in tracking pedestrians coming from various directions. The Kalman filter model with its self-correcting mechanism, guarantees that the tracking improves overtime as more raw detections are supplied. As long as consistent detections were supplied to the filter in the early stages, the tracking continues even when the detector becomes faulty.
{"title":"A novel pedestrian detection and tracking with boosted HOG classifiers and Kalman filter","authors":"Penny Chong, Yong Haur Tay","doi":"10.1109/SCORED.2016.7810052","DOIUrl":"https://doi.org/10.1109/SCORED.2016.7810052","url":null,"abstract":"This paper focuses on developing a stable pedestrian detection and tracking algorithm. Although Histogram of Oriented Gradients (HOG) features are the best representation for human shapes, computing these feature vectors are computationally expensive as it slows down the overall detection process. Hence with the use of cascade of boosted classifiers, the overall process was shortened significantly even in the absence of graphics processing unit (GPU). Along with Kalman filter approach, the algorithm achieved desirable results in tracking pedestrians coming from various directions. The Kalman filter model with its self-correcting mechanism, guarantees that the tracking improves overtime as more raw detections are supplied. As long as consistent detections were supplied to the filter in the early stages, the tracking continues even when the detector becomes faulty.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"41 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72586467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/SCORED.2016.7810090
W. Ahmad, M. H. Mamat, A. Zoolfakar, Z. Khusaimi, M. Rusop
In this article, we review hematite α-Fe2O3 focusing on its material properties, nanostructures, synthesis techniques, and various applications that have been associated using hematite α-Fe2O3. Hematite nanostructures can be prepared using many synthesis methods includes hydrothermal and it can be further improved by enhancing the synthesis techniques in order to accommodate the best performance for specific applications, and nevertheless to explore new applications of hematite in humidity sensing.
{"title":"A review on hematite α-Fe2O3 focusing on nanostructures, synthesis methods and applications","authors":"W. Ahmad, M. H. Mamat, A. Zoolfakar, Z. Khusaimi, M. Rusop","doi":"10.1109/SCORED.2016.7810090","DOIUrl":"https://doi.org/10.1109/SCORED.2016.7810090","url":null,"abstract":"In this article, we review hematite α-Fe<sub>2</sub>O<sub>3</sub> focusing on its material properties, nanostructures, synthesis techniques, and various applications that have been associated using hematite α-Fe<sub>2</sub>O<sub>3</sub>. Hematite nanostructures can be prepared using many synthesis methods includes hydrothermal and it can be further improved by enhancing the synthesis techniques in order to accommodate the best performance for specific applications, and nevertheless to explore new applications of hematite in humidity sensing.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"54 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76396893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/SCORED.2016.7810099
Vina Ayumi
This Paper investigate action recognition by using Extreme Gradient Boosting (XGBoost). XGBoost is a supervised classification technique using an ensemble of decision trees. In this study, we also compare the performance of Xboost using another machine learning techniques Support Vector Machine (SVM) and Naive Bayes (NB). The experimental study on the human action dataset shows that XGBoost better as compared to SVM and NB in classification accuracy. Although takes more computational time the XGBoost performs good classification on action recognition.
{"title":"Pose-based human action recognition with Extreme Gradient Boosting","authors":"Vina Ayumi","doi":"10.1109/SCORED.2016.7810099","DOIUrl":"https://doi.org/10.1109/SCORED.2016.7810099","url":null,"abstract":"This Paper investigate action recognition by using Extreme Gradient Boosting (XGBoost). XGBoost is a supervised classification technique using an ensemble of decision trees. In this study, we also compare the performance of Xboost using another machine learning techniques Support Vector Machine (SVM) and Naive Bayes (NB). The experimental study on the human action dataset shows that XGBoost better as compared to SVM and NB in classification accuracy. Although takes more computational time the XGBoost performs good classification on action recognition.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"26 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74331999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/SCORED.2016.7810033
Julius Teo Han Loong, Noor Alia Nor Hashim, F. A. Hamid
The memristor, short for memory resistor, is the fourth fundamental passive circuit element, whereby it can remember the resistance based on the last applied voltage. The memristor is used in the Physically Unclonable Function (PUF), which has potential for hardware security. To improve the performance of the memristor-based arbiter PUF, two modifications were made on the design, which are extracting multiple response bits from various stages in the delay paths in order to increase resistance against attacks, and using the SR latch rather than the D flip-flop as the arbiter because of better input-to-output path symmetry in the SR latch to minimize repsonse bias as well as circuit size and overhead. The proposed memristor-based APUF were simulated with two, three, and four memristors per stage. The memristor-based APUF performance were analyzed in terms of uniqueness, uniformity, and bit-aliasing, where the average values obtained were 49.32%, 53.21%, and 53.21%, respectively. The proposed memristor-based APUF performs well as expected.
{"title":"Memristor-based arbiter Physically Unclonable Function (APUF) with multiple response bits","authors":"Julius Teo Han Loong, Noor Alia Nor Hashim, F. A. Hamid","doi":"10.1109/SCORED.2016.7810033","DOIUrl":"https://doi.org/10.1109/SCORED.2016.7810033","url":null,"abstract":"The memristor, short for memory resistor, is the fourth fundamental passive circuit element, whereby it can remember the resistance based on the last applied voltage. The memristor is used in the Physically Unclonable Function (PUF), which has potential for hardware security. To improve the performance of the memristor-based arbiter PUF, two modifications were made on the design, which are extracting multiple response bits from various stages in the delay paths in order to increase resistance against attacks, and using the SR latch rather than the D flip-flop as the arbiter because of better input-to-output path symmetry in the SR latch to minimize repsonse bias as well as circuit size and overhead. The proposed memristor-based APUF were simulated with two, three, and four memristors per stage. The memristor-based APUF performance were analyzed in terms of uniqueness, uniformity, and bit-aliasing, where the average values obtained were 49.32%, 53.21%, and 53.21%, respectively. The proposed memristor-based APUF performs well as expected.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"154 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77443823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/SCORED.2016.7810031
N. A. Zainal, Z. Mustaffa
As the value of gold cannot be blindly rejected, forecasting the future prices of gold has long been an intriguing topic and is extensively studied by researchers from different fields including economics, statistics, and computer science. The motivation for these studies is naturally to predict the future prices so that gold can be bought and sold at profitable positions and reduce the risk of investment. However, there are still a lot of untackled questions and room for improvements in these forecasting techniques. This is because there are no optimal models for all forecasting problems. Different question needs a different answer; therefore, more experiments and modeling need to be done in order for researcher to enhance their findings. The target of this paper is to present a gold forecasting techniques using one of the optimization algorithm called Grey Wolf Optimizer (GWO).
{"title":"Developing a gold price predictive analysis using Grey Wolf Optimizer","authors":"N. A. Zainal, Z. Mustaffa","doi":"10.1109/SCORED.2016.7810031","DOIUrl":"https://doi.org/10.1109/SCORED.2016.7810031","url":null,"abstract":"As the value of gold cannot be blindly rejected, forecasting the future prices of gold has long been an intriguing topic and is extensively studied by researchers from different fields including economics, statistics, and computer science. The motivation for these studies is naturally to predict the future prices so that gold can be bought and sold at profitable positions and reduce the risk of investment. However, there are still a lot of untackled questions and room for improvements in these forecasting techniques. This is because there are no optimal models for all forecasting problems. Different question needs a different answer; therefore, more experiments and modeling need to be done in order for researcher to enhance their findings. The target of this paper is to present a gold forecasting techniques using one of the optimization algorithm called Grey Wolf Optimizer (GWO).","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"65 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89866625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/SCORED.2016.7810048
S. M. Hussain, Shaikh Azeemuddin Nizamuddin, Rolito Asuncion, Chandrashekar Ramaiah, Shafiq Ul Rehman
MANETS (Mobile Ad Hoc networks) are a group of wireless mobile nodes without any prefixed infrastructure that can move anywhere breaking and forming the links with the devices. Each node is responsible for routing the packets. Hence, each node acts as a router. A multi rate network allows a higher transmission capacity with wide range and also the signals can be transmitted with different bit rates. Thus there are many constraints concerning with the multi rate network like the data traffic integration, Quality of service and route establishment etc. Heterogeneous MANET'S are the networks with different nodes and different resources. In order to transmit a message the first requirement is to employ a route from end to end with minimum delay. In this paper, we have shown different delays that is involved during packet transmission considering different routes, hops and different rates with necessary mathematical formulations and conditions which proves to be enough for satisfying demands of quality of service (QOS) like discovering a path with minimal time delay. At the same time the other paths needs to be utilized to avoid the data rates to get degraded. For this purpose, Packetizing is used which can increase the efficiency and utility of a network. In our paper, we have proposed an approach that can ensure minimum delay though the routing parameters may differ. This kind of approach has found to be more efficient for the multimedia transmission over heterogeneous networks.
{"title":"Least delay path estimation routing protocol (LDPERP) with enhanced multimedia transmission through parallel links over heterogeneous MANETS","authors":"S. M. Hussain, Shaikh Azeemuddin Nizamuddin, Rolito Asuncion, Chandrashekar Ramaiah, Shafiq Ul Rehman","doi":"10.1109/SCORED.2016.7810048","DOIUrl":"https://doi.org/10.1109/SCORED.2016.7810048","url":null,"abstract":"MANETS (Mobile Ad Hoc networks) are a group of wireless mobile nodes without any prefixed infrastructure that can move anywhere breaking and forming the links with the devices. Each node is responsible for routing the packets. Hence, each node acts as a router. A multi rate network allows a higher transmission capacity with wide range and also the signals can be transmitted with different bit rates. Thus there are many constraints concerning with the multi rate network like the data traffic integration, Quality of service and route establishment etc. Heterogeneous MANET'S are the networks with different nodes and different resources. In order to transmit a message the first requirement is to employ a route from end to end with minimum delay. In this paper, we have shown different delays that is involved during packet transmission considering different routes, hops and different rates with necessary mathematical formulations and conditions which proves to be enough for satisfying demands of quality of service (QOS) like discovering a path with minimal time delay. At the same time the other paths needs to be utilized to avoid the data rates to get degraded. For this purpose, Packetizing is used which can increase the efficiency and utility of a network. In our paper, we have proposed an approach that can ensure minimum delay though the routing parameters may differ. This kind of approach has found to be more efficient for the multimedia transmission over heterogeneous networks.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"16 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83518450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/SCORED.2016.7810084
M. Tahir, M. H. Habaebi, M. R. Islam
We consider the problem of increasing the throughput in cognitive radio networks by forming coalitions among cognitive radio user in additive white Gaussian noise (AWGN) channel. For coalition formation using matching theory, we analyze two algorithms, namely Gale-Shapely algorithm and one-sided stable matching algorithm. For the first algorithm for coalition formation, well-known gale shapely algorithm is used to achieve cooperation among the cognitive radios for spectrum detection and sharing. Each cognitive radio prepares a preference list of other radios in the vicinity for cooperation and hence to form a coalition formation. The second algorithm is based one-sided matching theory which is a variant of the Gale-Shapely algorithm, however, to achieve a stable cooperation, certain criteria must be satisfied. The procedure is similar to the first algorithm (.i.e. formation of preference list and then making offers to other cognitive radio for cooperation) however the difference is in how the coalition formation takes place among the cognitive radios. Finally, using simulations we investigate various aspects of the algorithms and analyse their performance. The proposed algorithms result in improved spectrum detection as well as increasing the spectrum efficiency.
{"title":"Performance analysis of coalition formation algorithms based on matching theory for cognitive radio networks","authors":"M. Tahir, M. H. Habaebi, M. R. Islam","doi":"10.1109/SCORED.2016.7810084","DOIUrl":"https://doi.org/10.1109/SCORED.2016.7810084","url":null,"abstract":"We consider the problem of increasing the throughput in cognitive radio networks by forming coalitions among cognitive radio user in additive white Gaussian noise (AWGN) channel. For coalition formation using matching theory, we analyze two algorithms, namely Gale-Shapely algorithm and one-sided stable matching algorithm. For the first algorithm for coalition formation, well-known gale shapely algorithm is used to achieve cooperation among the cognitive radios for spectrum detection and sharing. Each cognitive radio prepares a preference list of other radios in the vicinity for cooperation and hence to form a coalition formation. The second algorithm is based one-sided matching theory which is a variant of the Gale-Shapely algorithm, however, to achieve a stable cooperation, certain criteria must be satisfied. The procedure is similar to the first algorithm (.i.e. formation of preference list and then making offers to other cognitive radio for cooperation) however the difference is in how the coalition formation takes place among the cognitive radios. Finally, using simulations we investigate various aspects of the algorithms and analyse their performance. The proposed algorithms result in improved spectrum detection as well as increasing the spectrum efficiency.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"14 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86098168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}