On the Asymptotic Throughput of the K-th Best Secondary User Selection in Cognitive Radio Systems

Yazan H. Al-Badarneh, Mohamed Slim Alouini

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

We analyze the asymptotic average and effective throughputs of a multiuser diversity scheme for a secondary multiuser network consisting of multiple secondary users (transmitters) and one secondary receiver. Considering a transmit power adaptation strategy at the secondary users to satisfy the instantaneous interference constraint at the primary receiver, the secondary receiver selects the k-th best secondary user for transmission, namely, the one with the k-th highest signal-to-noise ratio (SNR). We use extreme value theory to show that the k-th highest SNR converges uniformly in distribution to an inverse gamma random variable for a fixed k and large number of secondary users. We use this result to derive closed-form asymptotic expressions for the average and effective throughputs of the k-th best secondary user.

Original languageEnglish (US)
Title of host publication2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538663585
DOIs
StatePublished - Jul 2 2018
Event88th IEEE Vehicular Technology Conference, VTC-Fall 2018 - Chicago, United States
Duration: Aug 27 2018Aug 30 2018

Publication series

NameIEEE Vehicular Technology Conference
Volume2018-August
ISSN (Print)1550-2252

Conference

Conference88th IEEE Vehicular Technology Conference, VTC-Fall 2018
Country/TerritoryUnited States
CityChicago
Period08/27/1808/30/18

Bibliographical note

Publisher Copyright:
© 2018 IEEE.

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'On the Asymptotic Throughput of the K-th Best Secondary User Selection in Cognitive Radio Systems'. Together they form a unique fingerprint.

Cite this