{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,7]],"date-time":"2023-10-07T07:45:45Z","timestamp":1696664745776},"reference-count":30,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2015,7,7]],"date-time":"2015-07-07T00:00:00Z","timestamp":1436227200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2017,3,10]]},"abstract":"Summary<\/jats:title>In cognitive radio networks, signal to interference plus noise ratio (SINR) is a quantity that is used to analyze the bounds of the capacity of a channel. This is the reason for SINR being one of the important parameters toward evaluating the performance of spectrum sharing in every network. To maximize the channel utilization in any network, the SINR of a channel should be considered to be within a threshold. This also leads to lesser power consumption, and the quality of service for the licensed users is maintained. Further, reduced SINR leads to an improvement in the quality of communication in the network. In this paper, a graph theoretic measure for the efficient utilization of channels in cognitive radio networks has been proposed and is named as channel criticality based resource allocation (CCRA). Using the SINR as the weight of the graph, a novel concept of channel criticality has also been introduced in this work. The proposed CCRA technique has also been compared with the existing interference aware channel assignment (IACA) technique in terms of the channel utilization. Through simulations, the CCRA has been observed to outperform the IACA scheme. The average channel utilization of the proposed CCRA was observed to have increased by 8%, when the secondary users were introduced in the network as compared with the IACA technique. Copyright \u00a9 2015 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/dac.3012","type":"journal-article","created":{"date-parts":[[2015,7,7]],"date-time":"2015-07-07T10:20:55Z","timestamp":1436264455000},"source":"Crossref","is-referenced-by-count":3,"title":["CCRA: channel criticality based resource allocation in cognitive radio networks"],"prefix":"10.1002","volume":"30","author":[{"given":"Vinesh","family":"Kumar","sequence":"first","affiliation":[{"name":"School of Computer and Systems Sciences Jawaharlal Nehru University New Delhi India"}]},{"given":"Sonajharia","family":"Minz","sequence":"additional","affiliation":[{"name":"School of Computer and Systems Sciences Jawaharlal Nehru University New Delhi India"}]}],"member":"311","published-online":{"date-parts":[[2015,7,7]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1144"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/98.788210"},{"key":"e_1_2_7_4_1","unstructured":"MitolaJ.Cognitive Radio \u2014 An Integrated Agent Architecture for Software Defined Radio.DTech Thesis Royal Institute of Technology (KTH) Kista Sweden 2000."},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.839380"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5723803"},{"key":"e_1_2_7_7_1","doi-asserted-by":"crossref","unstructured":"BuddhikotMMUnderstanding dynamic spectrum access: Models taxonomy and challenges.2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2007) IEEE Dublin 2007;649\u2013663.","DOI":"10.1109\/DYSPAN.2007.88"},{"key":"e_1_2_7_8_1","unstructured":"DekkerAH ColbertBDNetwork robustness and graph topology.Proceedings of the 27th Australasian Conference on Computer Science\u2010Volume 26 Australian Computer Society Inc. 2004;359\u2013368."},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6172-3"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2350"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2014.000032"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1162"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2339"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1269"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1272"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2005.11.005"},{"key":"e_1_2_7_18_1","doi-asserted-by":"crossref","unstructured":"LuL HeD YuX LiGYGraph\u2010based robust resource allocation for cognitive radio networks.IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP 2014) IEEE Florence 2014;7298\u20137302.","DOI":"10.1109\/ICASSP.2014.6855017"},{"key":"e_1_2_7_19_1","doi-asserted-by":"crossref","unstructured":"YousefvandM KhorsandiS MohammadiAInterference\u2010constraint spectrum allocation model for cognitive radio networks.6th IEEE International Conference Intelligent Systems (IS) 2012 IEEE Sofia 2012;357\u2013362.","DOI":"10.1109\/IS.2012.6335161"},{"key":"e_1_2_7_20_1","doi-asserted-by":"crossref","unstructured":"HoangAT LiangY\u2010CMaximizing spectrum utilization of cognitive radio networks using channel allocation and power control.Vehicular Technology Conference 2006. VTC\u20102006 Fall. 2006 IEEE 64th IEEE Montreal Que 2006;1\u20135.","DOI":"10.1109\/VTCF.2006.257"},{"key":"e_1_2_7_21_1","doi-asserted-by":"crossref","unstructured":"MaqboolW YusofSKS LatiffNM HafizahS NejatianS FarzamniaA ZubairSInterference aware channel assignment (IACA) for cognitive wireless mesh networks.IEEE Malaysia International Conference on Communications (MICC 2013) IEEE Kuala Lumpur 2013;330\u2013334.","DOI":"10.1109\/MICC.2013.6805849"},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1291"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100105"},{"key":"e_1_2_7_24_1","doi-asserted-by":"crossref","unstructured":"TizghadamA Leon\u2010GarciaASurvival value of communication networks.Infocom Workshops 2009 IEEE IEEE Rio de Janeiro 2009;1\u20136.","DOI":"10.1109\/INFCOMW.2009.5072195"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2004.11.009"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5634437"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(94)90015-9"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2005.05.001"},{"key":"e_1_2_7_29_1","doi-asserted-by":"crossref","unstructured":"TizghadamA Leon\u2010GarciaAOn robust traffic engineering in transport networks.Global Telecommunications Conference 2008. IEEE GLOBECOM 2008. IEEE IEEE New Orleans LO 2008;1\u20136.","DOI":"10.1109\/GLOCOM.2008.ECP.456"},{"key":"e_1_2_7_30_1","doi-asserted-by":"crossref","unstructured":"TizghadamA ShariatA Leon\u2010GarciaA NaserHRobust QoS\u2010guaranteed network engineering in interference\u2010aware wireless networks.IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS 2013) IEEE Turin 2013;169\u2013174.","DOI":"10.1109\/INFCOMW.2013.6562864"},{"key":"e_1_2_7_31_1","volume-title":"Matrix Mathematics","author":"Bernstein DS","year":"2005"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.3012","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.3012","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.3012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T17:53:57Z","timestamp":1696614837000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.3012"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,7]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,3,10]]}},"alternative-id":["10.1002\/dac.3012"],"URL":"https:\/\/doi.org\/10.1002\/dac.3012","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"value":"1074-5351","type":"print"},{"value":"1099-1131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,7]]}}}