Int J Wireless Inf Networks (2011) 18:171–178 DOI 10.1007/s10776-011-0148-y
Opportunistic Spectrum Access Using Fuzzy Logic for Cognitive Radio Networks Hong-Sam T. Le • Hung D. Ly • Qilian Liang
Received: 27 March 2009 / Accepted: 15 April 2011 / Published online: 15 May 2011 Springer Science+Business Media, LLC 2011
Abstract Recent studies and measurements have shown that, with the traditional spectrum access approach, the radio spectrum assigned to primary (licensed) users is vastly underutilized. While many spectrum methods have been proposed to use spectrum effectively, the opportunistic spectrum access has become the most viable approach to achieve near-optimal spectrum utilization by allowing secondary (unlicensed) users to sense and access available spectrum opportunistically. Opportunistic spectrum access approach is enabled by cognitive radios which are able to sense the unused spectrum and adapt their operating characteristics to the real-time environment. However, a naive spectrum access for secondary users can make spectrum utilization inefficient and increase interference to adjacent users. In this paper, we propose a novel approach using Fuzzy Logic System (FLS) to control the spectrum access. Three descriptors are used: spectrum utilization efficiency of the secondary user, its degree of mobility, and its distance to the primary user. The linguistic knowledge of spectrum access based on these three descriptors is obtained from a group of network experts. 27 fuzzy rules are set up based on this linguistic knowledge.
H.-S. T. Le Department of Telecommunications Engineering, Posts and Telecommunications Institute of Technology, Hanoi, Vietnam H. D. Ly (&) Department of Electrical and Computer Engineering, Texas A&M University, College Station, TX, USA e-mail:
[email protected] Q. Liang Department of Electrical Engineering, The University of Texas at Arlington, Arlington, TX, USA
The output of the FLS provide the possibility of accessing spectrum band for secondary users and the user with the greatest possibility will be assigned the available spectrum band. Keywords Cognitive radio Fuzzy logic system Opportunistic spectrum access
1 Introduction Recent studies and measurements have shown that, with the traditional spectrum access approach, the radio spectrum assigned to primary (licensed) users is vastly underutilized while the demand for access to the limited radio spectrum have been growing dramatically. This view is supported by actual measurements conducted by the FCC’s Spectrum Policy Task Force which has determined that, in some locations or at some times of a day, about 70% of the allocated spectrum may not be in use [1]. Measurements in [2] reveal that spectrum utilization is often heavy in unlicensed bands while low in TV bands or medium in some cellular bands. These observations on actual spectrum usage have challenged approaches to the radio spectrum management and fueled interests in the opportunistic spectrum access problem. Opportunistic spectrum access has been enabled by cognitive radios (CRs). Unlike conventional radios, CRs have the capability to sense their surroundings and actively adapt their operation mode to maximize the quality of service for secondary users while minimizing interference to primary users. Hence, CRs must carry out spectrum sensing to identify white spaces or spectrum holes which are bands of frequencies assigned to primary users, but, at a particular time and specific geographic location, these
123
172
bands are not being utilized by those users [3]. Some methods on spectrum sensing has been proposed in [4, 5], and [14]. Once spectrum holes are identified, CRs opportunistically utilize these holes for communication without causing interference to primary users. Assume that a spectrum band is available for secondary users. If only one secondary user, in a particular location and at a specific time, can sense this available spectrum, this secondary user can use this band right after the primary user finishes the communication session. What will happen, however, and which secondary user will be chosen to use the available band if multiple secondary users try to access the spectrum? Of course, for the former question, since these secondary users have the same rights to access the spectrum, they have to compete with each other in a collaborative and fair manner. This paper will give more detail answer for these questions and propose a novel approach using Fuzzy Logic System (FLS), an artificial intelligence system which is capable of making real time decisions, to decide the suitable secondary user which will use the available band. In research literature on opportunistic spectrum access, some work uses game theoretical analysis [6] to find strategies for spectrum sharing. In [7], spectrum allocation using a graph coloring algorithm is proposed but mobility of the secondary users is not considered. Moreover, authors assumed that if two secondary users within distance of each other use the same spectrum band, they fail to access spectrum. With this approach, some secondary users will lose the rights to compete for using spectrum and monitoring secondary users conflicting in using spectrum band is also a challenging issue. In our approach, we use the rule-based FLS to assign the available spectrum to secondary users efficiently and guarantee that the secondary user using assigned band will not interfere with the primary users. To achieve these objectives, we use three descriptors which are spectrum utilization efficiency of the secondary user, its degree of mobility, and its distance to the primary user. The linguistic knowledge of spectrum access based on these three descriptors is obtained from a group of network experts. 27 fuzzy rules are set up based on this linguistic knowledge. The output of the FLS provide the possibility of each secondary user which will be assigned spectrum band and the user with the greatest possibility will be assigned the available spectrum band. The rest of this paper is organized as follows. In Sect. 2, we briefly introduce the fuzzy logic system and cognitive radios. Opportunistic spectrum access using the FLS which is based on experiences from a group of network experts is proposed in Sect. 3. In Sect. 4, we discuss the simulation results. Conclusions and future works are presented in Sect. 5.
123
Int J Wireless Inf Networks (2011) 18:171–178
2 Preliminaries 2.1 Cognitive Radios Cognitive Radios have been seen as the key technology that enables cognitive radio networks or xG networks to use spectrum efficiently by allowing secondary (cognitive) users to sense and utilize available spectrum opportunistically. Cognitive radios have two intrinsic characteristics [3]: •
•
Cognitive capability: Cognitive capability implies the ability of cognitive radios to sense information from their surroundings in order to figure out spectrum portions that are unused at a specific time or location. The most suitable portion will be selected for communication without causing interference to other users. Reconfigurability: Reconfigurability enables cognitive radios to be dynamically reprogrammed according to the real environment. This means that cognitive radios can change the operating frequency, modulation scheme, transmission power, communication protocol, etc. on the fly without any modification of hardware components.
Cognitive radios, in order to use spectrum opportunistically, experience four main procedures, i.e., 1.
2.
3.
4.
Spectrum sensing: A cognitive radio monitors spectrum bands and detects unused bands, i.e., spectrum holes which are time-varying and location-dependent. Cognitive radio can use the spectrum sensing techniques such as transmitter detection, cooperative detection, and interference-based detection. Spectrum access: Assume that multiple cognitive users trying to use the spectrum coexist in an area. This procedure is used to prevent multiple users from colliding in overlapping spectrum portions. Communication: Once a cognitive radio is assigned a spectrum band for communication, it will inform its receiver about the chosen band. After the receivertransmitter handshake procedure is completed, the cognitive radio begins receiving and/or transmitting information. Spectrum mobility: A cognitive radio must move to another spectrum hole to keep doing communication once it detects the signal from the primary user. Hence, spectrum mobility occurs when a cognitive radio change its operating band.
There have been many open research problems to develop these procedures. In this paper, we use the fuzzy logic system, i.e., an optimization technique, to give solutions for the opportunistic spectrum access problem. The most suitable secondary user having the rights to access the spectrum is chosen based on three descriptors, i.e., spectrum
Int J Wireless Inf Networks (2011) 18:171–178
173
Expert knowledge for selecting the best suitable secondary user to access the available band is collected based on the following three antecedents, i.e., descriptors:
FUZZY LOGIC SYSTEM
RULES CRISP OUTPUT
CRISP INPUT FUZZIFIER
DEFUZZIFIER
x X
y f (x) Y INFERENCE FUZZY INPUT SETS
FUZZY OUTPUT SETS
Fig. 1 The structure of a Fuzzy Logic System
usage efficiency of the secondary user, its degree of mobility, and its distance to the primary user. 2.2 Fuzzy Logic Systems Figrue1 shows the structure of a fuzzy logic system (FLS). When an input is applied to a FLS, the inference engine computes the output set corresponding to each rule. The defuzzifier then computes a crisp output from these rule output sets. Consider a p-input 1-output FLS, using singleton fuzzification, center-of-sets defuzzification and ‘‘IF-THEN’’ rules of the form [8] l
R : IF x1 is
Fl1
Fl2
and x2 is and . . . and xp is THEN y is Gl
Flp ;
Assuming singleton fuzzification is used, when an input x0 ¼ fx01 ; x02 ; . . .; x0p g is applied, the degree of firing corresponding to the lth rule is computed as lF1l ðx01 ÞHlF2l ðx02 ÞH HlFpl ðx0p Þ ¼ T pi¼1 lFil ðx0i Þ
1. 2. 3.
Antecedent 1: Spectrum utilization efficiency. Antecedent 2: Degree of mobility. Antecedent 3: Distance to the primary user.
Generally, the secondary user with the furthest distance to the primary user or the secondary user with maximum spectrum utilization efficiency can be chosen to access spectrum under the constraint that no interference is created for the primary user. In our approach, using the rulebased FLS, we combine the above three descriptors to find optimal solutions to assign spectrum opportunistically. We see that different users will perceive different available spectrum and using spectrum efficiently is the main purpose of the opportunistic spectrum access schemes. Hence, spectrum utilization efficiency gs is introduced in our design. gs is defined as the ratio between the spectrum band which will be used by the secondary user and the available band, i.e., gs ¼
where M is the number of rules in the FLS. 3 Knowledge Processing and Opportunistic Spectrum Access 3.1 Designing the Fuzzy Logic System for Opportunistic Spectrum Access We design a fuzzy logic system to solve the opportunistic spectrum access problem in cognitive radio networks.
ð3Þ
where BWs and BWa are the spectrum band which will be used by the secondary and the available band, respectively. Mobility of the secondary user plays an important role in our design. When the secondary user is moving at a velocity v m/s, it causes the Doppler effect.
ð1Þ
where H and T both indicate the chosen t-norm. There are many kinds of defuzzifiers. In this paper, we focus, for illustrative purposes, on the center-of-sets defuzzifier. It computes a crisp output for the FLS by first computing the centroid, cGl ; of every consequent set Gl, and, then computing a weighted average of these centroids. The weight corresponding to the lth rule consequent centroid is the degree of firing associated with the lth rule, T pi¼1 lFil ðx0i Þ; so that PM p 0 l¼1 cGl T i¼1 lFil ðxi Þ 0 ycos ðx Þ ¼ PM ð2Þ p 0 l¼1 T i¼1 lFil ðxi Þ
BWs 100% BWa
fD ¼
vcosh fc c
ð4Þ
where fD is the Doppler shift, h is the arrival angle of the received signal relative to the direction of motion, c is the wave velocity, and fc is carrier frequency. Mobility can reduce capability of detecting signal from the primary users. If the secondary user is not capable of detecting the primary signal, it will incorrectly determine that the spectrum is unused; thereby leading to potential interference to adjacent users, i.e., the signal transmitted by the secondary user will interfere with the signal that the primary user is trying to decode. This situation is often referred as the hidden node problem. Besides, we also consider the distance from the secondary user to the primary user. Actually, the location of the primary users is unknown. We can consider signal-tonoise ratio (SNR) as a proxy for distance [9]. Assume the primary user at the distance R from the secondary user transmits signal at power P1 and the power gain between the primary user and secondary user, g(R), is a continuous, nonnegative, strictly decreasing function of R defined on the interval ½0; 1: SNR at the secondary user, cs, is given by
123
174
P1 gðRÞ cs ¼ 10log r21
Int J Wireless Inf Networks (2011) 18:171–178 1.5
ð5Þ
where P1 is the transmit power of the primary user and r21 is noise power measured at the secondary user. From (5), we can derive the distance R between the primary user and the secondary user. The linguistic variances used to represent the spectrum utilization efficiency and degree of mobility are divided into three levels: low, moderate, and high while we use 3 levels, i.e., near, moderate, and far to represent the distance. The consequence, i.e., the possibility that the secondary user is chosen to access the spectrum is divided into five levels which are very low, low, medium, high and very high. We use trapezoidal membership functions (MFs) to represent near, low, far, high, very low and very high, and triangle MFs to represent moderate, low, medium and high. MFs are shown in Fig. 2. Since we have 3 antecedents and 3 fuzzy subsets, we need set up 33 = 27 rules for this FLS. Then, we design questions, which will be used in our survey, according to rules as follows: IF the spectrum utilization efficiency of the secondary user is moderate, its degree of mobility is low, and its distance to the primary user is far THEN the possibility that this user is selected to access the spectrum is . 3.2 Knowledge Processing and Opportunistic Spectrum Access As pointed out in [10], ‘‘words mean different things to different people’’, and in [11], ‘‘the decision makers may have the same preferences to a particular alternative, e.g., highly preferred but with different degrees;’’ so, we created one survey for the network experts. We used rules obtained from the knowledge of 5 network experts. These experts were requested to choose a consequent, using one of the five linguistic variables. Different experts gave different answers to the questions in the survey. Table 1 summarizes the questions used in this survey. As an example, we also give an expert’s answer in this table. Since we chose a single consequent for each rule to form a rule base, we averaged the centroids of all the responses for each rule and used this average in place of the rule consequent centroid. Doing this leads to rules that have the following form: Rl: IF spectrum utilization efficiency of the secondary (x1) is F1l, and its degree of mobility(x2) is F2l, and its distance to the primary user (x3) is F3l, THEN the possibility (y) that this secondary user is chosen to access the available spectrum is clavg. where l ¼ 1; 2; . . .; 27 and clavg is defined as follows: P5 wli ci l cavg ¼ Pi¼1 ð6Þ 5 l i¼1 wi
123
Moderate
Low
High
1
0.5
0 0
10
20
30
40
50
60
70
80
90
100
(a) 1.5
Low, Near
Moderate
High, Far
1
0.5
0 0
1
2
3
4
5
6
7
8
9
10
(b) 1.5
Low
Very Low
Medium
Very High
High
1
0.5
0 0
10
20
30
40
50
60
70
80
90
100
(c) Fig. 2 The membership functions (MF) used to represent the linguistic labels: a MF for antecedent 1, b MFs for other antecedents, c MF for consequence
Int J Wireless Inf Networks (2011) 18:171–178
175
Table 1 Questions for opportunistic spectrum access problem in cognitive radio networks
Table 2 cavg Corresponding to each rule Rule #
cavg
Rule # Antecedent 1 Antecedent 2 Antecedent 3 Consequence 1
17.222
1
Low
Low
Near
Very low
2
23.611
2
Low
Low
Moderate
Low
3
43.333
3
Low
Low
Far
Low
4
23.611
4
Low
Moderate
Near
Very low
5
30
5
Low
Moderate
Moderate
Low
6
43.333
6
Low
Moderate
Far
Medium
7
10.833
7 8
Low Low
High High
Near Moderate
Very low Low
8
23.611
9
36.667
9
Low
High
Far
Medium
10
30.278
10
Moderate
Low
Near
Very low
11
Moderate
Low
Moderate
Medium
11 12
56.667 76.389
12
Moderate
Low
Far
High
13
23.889
13
Moderate
Moderate
Near
Very low
14
43.333
14
Moderate
Moderate
Moderate
Medium
15
63.33
15
Moderate
Moderate
Far
High
16
17.22
16
Moderate
High
Near
Very low
17
30.278
17
Moderate
High
Moderate
Low
18
56.667
18
Moderate
High
Far
High
19
50
19
High
Low
Near
Low
20
70
20
High
Low
Moderate
High
21
89.167
21
High
Low
Far
Very high
22
36.667
22 23
High High
Moderate Moderate
Near Moderate
Low High
23
63.333
24
82.778
24
High
Moderate
Far
Very high
25
30.287
25
High
High
Near
Very low
26
56.667
26
High
High
Moderate
High
27
63.333
27
High
High
Far
High
4 Simulation Results and Discussion in which wli is the number of experts choosing linguistic label i
i for the consequence of rule l and c is the centroid of the ith consequence set (i ¼ 1; 2; . . .; 5; l ¼ 1; 2; . . .; 27). Table 2 provides cavg for each rule from the completed survey. For every input (x1, x2, x3), the output y(x1, x2, x3) of the designed FLS is computed as P27 l l¼1 lF l ðx1 ÞlF2l ðx2 ÞlF3l ðx3 Þcavg yðx1 ; x2 ; x3 Þ ¼ P27 1 ð7Þ l¼1 lF1l ðx1 ÞlF2l ðx2 ÞlF3l ðx3 Þ
We recognize that (7) can be represented in a 4-D surface. Since it is impossible to plot visually, we fix one of three variables. More specifically, we fixed the distance to the primary user x3. Two cases, i.e., x3 = 1 and x3 = 9, were considered. Figure 3 represents the opportunistic spectrum access decision surface for the cognitive user for these two cases. From Fig. 3, we see clearly that, at the same spectrum utilization efficiency and mobility degree, secondary users further from the primary user have higher chance to access the spectrum.
To validate our approach, we randomly generated 20 secondary users over an area of 100 9 100 meters. The primary user was placed randomly in this area. Three descriptors were randomly generated for each secondary user. More specifically, the spectrum utilization efficiency of each secondary user was a random value in the interval [0,100], and its mobility degree in [0,10]. Distances to the primary users were normalized to [0,10]. di max20 i¼1 fdi g qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi di ¼ ðxi xp Þ2 þ ðyi yp Þ2
Di ¼
ð8Þ ð9Þ
where (xp, yp) and (xi, yi) represent the coordinate of the primary user and the ith secondary user ði ¼ 1; 2; . . .; 20Þ: The values of descriptors corresponding to each secondary user were passed through the FLS. The output of the FLS, i.e., the possibility that a secondary user was selected to access the available spectrum, was computed as
123
176
Int J Wireless Inf Networks (2011) 18:171–178 Table 3 Three descriptors and possibility for four secondary users Parameters
SU1
SU2
SU3
SU4
55 50
Mobility degree
2.4966
3.0715
40
Distance to PU
8.4852
3.0036 10
35
Possibility
30
Spectrum usage efficiency (%) 88.7104 97.9340 24.2160 92.4424
y(x ,x ,1) 1 2
45
25
6.5382
0.9135 1.6437
82.2944 54.5189 45.3072 53.1432
20 15
100
10 10 8
100 80
6
x2
60
4
40
2 0
20 0
90 80
x1
70
(a)
60 50 90
40
1
y(x ,x2,9)
80
30
70
20 60
10
50
0
40 30 10 8
100 80
6
x2
60
4
40
2
20 0
x1
0
10
20
30
40
50
60
70
80
90
Fig. 4 An opportunistic spectrum access scenario in a specific space and a particular time: SU1, SU2, SU3, and SU4 are denoted using H; 5; ; and }; respectively. The primary user is denoted using h
0
(b) Guard Symbols (3 symbols)
Unique Word (40 symbols)
Payload (500 symbols)
Guard Symbols (3 symbols)
Fig. 3 The opportunistic spectrum access decision surface for the cognitive user with a fixed distance to the primary user: a when the distance to the primary user x3 = 1, b when the distance to the primary user x3 = 9
Fig. 5 Burst structure
in (7). Then, the secondary user with the highest possibility would be chosen to access the spectrum. At a particular time, values of three descriptors and possibility for four secondary users, i.e., the secondary user chosen to access the available spectrum (SU1), the secondary user with the highest spectrum utilization efficiency (SU2), the secondary user having the furthest distance to the primary user (SU3), and the secondary user with the lowest mobility degree (SU4) are listed in Table 3. Position of these users is shown in Fig. 4. We see that, in Table 3, SU2 has the highest spectrum utilization efficiency with 97.93%, SU4 with 92.4424% while SU1 only achieves 88.7104%. Although SU3 is the secondary user with the furthest distance, it has the lowest spectrum utilization efficiency and highest mobility degree. We also ran the Monte-Carlo simulation to analyze the performance of secondary users with different mobility degrees (see Table 3). In this simulation, we used the Rician flat fading channel with fading factor K = 12 dB
and Doppler shift fd = 41.6100, 51.1917, 108.9700, and 15.2250 Hz for SU1, SU2, SU3, and SU4, respectively. QPSK modulation scheme was used at transmitter side and block phase estimation algorithm proposed in [13] was applied at receiver side. Burst structure is depicted in Fig. 5 with 546 QPSK symbols (500 symbols payload, 40 symbols Unique Word, and 6 symbols guards) were used. Performance of secondary users in term of mobility degree and Eb/N0 is depicted in Fig. 6. Based on Fig. 6, we note that, at the same Eb/N0, SU4 with the lowest Doppler shift can achieve the best performance while SU3 with the highest Doppler shift has the worst performance. Performance of SU1 and SU2 is similar since there is a small difference between Doppler shifts. From above results, we can confirm that spectrum access decision is tradeoffs among three descriptors chosen to design the FLS. Therefore, the secondary user with the highest spectrum utilization or the secondary user furthest from the primary user
123
Int J Wireless Inf Networks (2011) 18:171–178
177
SU1 SU2 SU3 SU4
−1
BER
10
−2
10
1
2
3
4
5
6
7
Eb/N0 [dB]
Fig. 6 Performance analysis of secondary users in term of mobility degree and Eb/N0
is not guaranteed to access the spectrum. The secondary user selected to access spectrum has the distance to PU 8.4852, spectrum utilization efficiency 88.7104% and mobility degree 2.4966. Until now, someone may have two more questions: (1) who will decide the spectrum access rights for the secondary users? (2) if there are N users competing for M spectrum bands (N [[ M), how can we control the spectrum access? Since we use the centralized spectrum sharing architecture, a centralized entity such as base stations in cognitive wireless networks or clusterheads in sensor networks collects information about three descriptors and available spectrum bands from secondary users through a common control channel and builds a spectrum map. Then, it uses our designed FLS to control the spectrum assignment and access procedures in order to prevent multiple users from colliding in overlapping spectrum portions. In case, N users competing for M spectrum bands, the centralized processor also takes advantage of our FLS for each band to allow the best secondary user to access each spectrum.
5 Conclusion and Future Works We propose a novel approach using the rule-based fuzzy logic system to control the opportunistic spectrum access for secondary users in cognitive radio networks. The secondary user is selected based on three descriptors, i.e., spectrum utilization efficiency of the secondary user, its degree of mobility, and its distance to the primary user. The linguistic knowledge of spectrum access is based on experiences from a group of network experts, so that an acceptable decision can be obtained. As a result, we
represent the opportunistic spectrum access decision surface. An opportunistic spectrum access scenario was analyzed and simulated to validate our approach. In our approach, moreover, we can modify the membership functions of descriptors in accordance to requirements of the primary network and the spectrum using policy. Hence, our approach is promising to be implemented practically in future cognitive radio networks. We see that it is better if the secondary user uses multiple bands simultaneously for transmission since multiband transmission provide better performance than single band transmission during the spectrum handoff [14]. This means that if a primary user returns to utilize a specific band, the secondary user must vacate this band. Since transmission is still continuing in other bands, quality of service (QoS) degradation can be mitigated. Using our scheme, multiple spectrum band decision for a secondary user is also obtained. However, some secondary users try to get as much spectrum bands as possible and they can keep some of these bands for future transmission when the spectrum handoff occurs. By this way, spectrum utilization is not efficient. So, it is important to investigate some solutions to prevent some users from using spectrum ineffectively and solve the mobility management problem in order to keep a high QoS of cognitive radio networks.
References 1. Spectrum policy task force report, Technical report 02-135, Federal communications commission, Nov. 2002. 2. M. McHenry, Report on spectrum occupancy measurements, http://www.sharedspectrum.com/ 3. S. Haykin, Cognitive radio: Brain-empowered wireless communication, IEEE Journal on Selected Areas in Communications, Vol. 23, No. 5, pp. 201–220, 2005. 4. R. Tandra and A. Sahai, Fundamental limits on detection in low SNR under noise uncertainty, International Conference on Wireless Networks, Communications and Mobile Computing, Vol. 1, pp. 464–469, 2005. 5. B. Wild and K. Ramchandran, Detecting primary receivers for cognitive radio applications, IEEE Proc. on DySPAN 2005, pp. 124–130, 2005. 6. N. Nie and C. Comaniciu, Adaptive channel allocation spectrum atiquette for cognitive radio networks, IEEE Pro. on DySPAN 2005, pp. 269–278, 2005. 7. H. Zheng and C. Peng, Collabraton and fairness in opportunistic spectrum access, IEEE International Conference on Communications (ICC) 2005. 8. J.M. Mendel, Uncertainty rule-based fuzzy logic systems, Prentice-Hall, Upper Saddle Rever, NJ, 2001. 9. Hoven, N. and Sahai, A., Power scaling for cognitive radio, International Conference on Wireless Networks, Communications and Mobile Computing, Vol. 1, pp. 250–255, 2005. 10. J. M. Mendel, Computing with words when words can mean different things to different people, Int’l ICSC Congress on Computational Intelligence: Methods and Applications, NY, 1999.
123
178
Int J Wireless Inf Networks (2011) 18:171–178
11. Marimin, et al., Linguistic labels for expressing fuzzy preference relations in fuzzy group decisio making, IEEE Trans. on Systems, Man, and Cybernetics—Part B: Cybernetics, Vol. 28, No. 2, pp. 205–218, 1998. 12. Q. Liang, Clusterhead election in mobile ad hoc networks, IEEE Proc.on Personal, Indoor and Mobile Radio Communications, Vol. 2, pp. 1623–1628, 2003. 13. A.J. Viterbi and A.M. Virterbi, Nonlinear estimation of PSKmodulated carrier phase with application to burst digital transmission, IEEE Trans. on Information Theory, Vol. 29, No. 4, pp. 543–551, 1983. 14. Ian F. Akyildiz, et al., NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey, Computer Networks Journal (Elsevier), Vol. 50, pp. 2127–2159, 2006.
Author Biographies Hong-Sam T. Le received her B.S. degree in Electronics and Telecommunications Engineering from Posts and Telecommunications Institute of Technology, Hanoi, Vietnam in 2003 and her M.S. degree in Electrical Engineering from the University of Texas at Arlington in 2007. Her research interests are in the areas of wireless communication and signal processing.
Hung D. Ly received the B.S. degree in Electronics and Telecommunications Engineering from Posts and Telecommunications Institute of Technology, Hanoi, Vietnam in 2002, and the M.S. degree in Electrical Engineering from the University of Texas at Arlington in 2007. He is currently pursuing the Ph.D. degree in Electrical and Computer Engineering at Texas A&M University. His research interests include information theory, wireless communication, and signal processing.
123
Qilian Liang is a Professor at the Department of Electrical Engineering, University of Texas at Arlington. He received the B.S. degree from Wuhan University in 1993, M.S. degree from Beijing University of Posts and Telecommunications in 1996, and Ph.D degree from University of Southern California (USC) in May 2000, all in Electrical Engineering. Prior to joining the faculty of the University of Texas at Arlington in August 2002, he was a Member of Technical Staff in Hughes Network Systems Inc at San Diego, California. His research interests include compressive sensing, radar sensor networks, wireless sensor networks, wireless communications, communication system and communication theory, signal processing for communications, fuzzy logic systems and applications, etc. Dr. Liang has published more than 170 journal and conference papers, 7 book chapters, and has 6 U.S. patents pending. He received 2002 IEEE Transactions on Fuzzy Systems Outstanding Paper Award, 2003 U.S. Office of Naval Research (ONR) Young Investigator Award, 2005 UTA College of Engineering Outstanding Young Faculty Award, and 2007, 2009, 2010 U.S. Air Force Summer Faculty Fellowship Program Award.