{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:04:41Z","timestamp":1754157881665,"version":"3.41.2"},"reference-count":23,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2012,11,23]],"date-time":"2012-11-23T00:00:00Z","timestamp":1353628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11,23]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The main purpose of the current work is high quality video transmission over cognitive radio wireless networks.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>A soft computing technique based on fuzzy logic concept is introduced that can reduce the blocking probability and increase the perceived quality of video users.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>It is found that by using soft computing techniques it is possible to increase the perceived quality and reduce the blocking probability in cognitive radio networks for secondary video users.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The main originality of this paper is twofold: at first the design philosophy in admission is quality of experience centric and second, soft computing techniques are used to decrease the blocking probability in cognitive networks.<\/jats:p><\/jats:sec>","DOI":"10.1108\/17427371211283047","type":"journal-article","created":{"date-parts":[[2012,11,22]],"date-time":"2012-11-22T05:17:36Z","timestamp":1353561456000},"page":"395-414","source":"Crossref","is-referenced-by-count":0,"title":["Quality\u2010centric soft admission control for video delivery over cognitive radio networks"],"prefix":"10.1108","volume":"8","author":[{"given":"Pejman","family":"Goudarzi","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022021720141971800_b7","doi-asserted-by":"crossref","unstructured":"Andersin, M., Rosberg, Z. and Zander, J. (1995), \u201cGradual removals in cellular PCS with constrained power control and noise\u201d, IEEE PIMRC, Vol. 1, pp. 56\u201060.","DOI":"10.1007\/BF01201460"},{"key":"key2022021720141971800_b18","doi-asserted-by":"crossref","unstructured":"Andersin, M., Rosberg, Z. and Zander, J. (1997), \u201cSoft and safe admission control in cellular networks\u201d, IEEE Transactions on Networking, Vol. 5, pp. 255\u201065.","DOI":"10.1109\/90.588096"},{"key":"key2022021720141971800_b5","unstructured":"Farahani, M., Ghasemi, A. and Razavizadeh, S.\u2010M. (2010), \u201cSequential interference\u2010aware admission control in underlay cognitive radio networks\u201d, International Journal of Information and Communication Technology, Vol. 2, pp. 33\u201040."},{"key":"key2022021720141971800_b1","unstructured":"FCC (2002), Spectrum Police Task Force Report, FCC, Washington, DC."},{"key":"key2022021720141971800_b3","doi-asserted-by":"crossref","unstructured":"Fiedler, M., Hossfeld, T. and Tran\u2010Gia, P. (2010), \u201cA generic quantitative relationship between quality of experience and quality of service\u201d, IEEE Network, Vol. 24 No. 2, pp. 36\u201041.","DOI":"10.1109\/MNET.2010.5430142"},{"key":"key2022021720141971800_b17","doi-asserted-by":"crossref","unstructured":"Grandhi, S.A. and Zander, J. (1994), \u201cConstrained power control in cellular radio systems\u201d, IEEE VTC, pp. 824\u20108.","DOI":"10.1109\/VETEC.1994.345205"},{"key":"key2022021720141971800_b9","doi-asserted-by":"crossref","unstructured":"Gu, H. and Yang, C. (2008), \u201cPower and admission control for UWB cognitive radio networks\u201d, IEEE ICC, pp. 4933\u20107.","DOI":"10.1109\/ICC.2008.924"},{"key":"key2022021720141971800_b4","unstructured":"ITU\u2010T (1996), Methods for Subjective Determination of Transmission, ITU\u2010T Recommendation P.800, ITU\u2010T, Geneva."},{"key":"key2022021720141971800_b16","unstructured":"ITU\u2010T (2007), Opinion Model for Video\u2010Telephony Applications, ITU\u2010T Recommendation G.1070, ITU\u2010T, Geneva."},{"key":"key2022021720141971800_b2","doi-asserted-by":"crossref","unstructured":"Jiang, H., Zhang, W., Shen, X. and Bi, Q. (2006), \u201cQuality of\u2010service provisioning and efficient resource utilization in CDMA cellular communications\u201d, IEEE JSAC, Vol. 24, pp. 4\u201015.","DOI":"10.1109\/JSAC.2005.858897"},{"key":"key2022021720141971800_b23","doi-asserted-by":"crossref","unstructured":"Jones, C.E., Sivalingam, K.M., Agrawal, P. and Chen, J.C. (2001), \u201cA survey of energy efficient network protocols for wireless networks\u201d, Wireless Networks, Vol. 7, pp. 343\u201058.","DOI":"10.1023\/A:1016627727877"},{"key":"key2022021720141971800_b11","doi-asserted-by":"crossref","unstructured":"Kim, D.I., Le, L.B. and Hossain, E. (2008), \u201cJoint rate and power allocation for cognitive radios in dynamic spectrum access environment\u201d, IEEE Transactions on Wireless Communications, Vol. 7, pp. 5517\u201027.","DOI":"10.1109\/T-WC.2008.071465"},{"key":"key2022021720141971800_b15","unstructured":"Kim, H.L. and Choi, S.G. (2010), \u201cA study on a QoS\/QoE correlation model for QoE evaluation on IPTV service\u201d, 12th International Conference on Advanced Communication Technology (ICACT), Vol. 2, pp. 1377\u201082."},{"key":"key2022021720141971800_b6","doi-asserted-by":"crossref","unstructured":"Le, L. and Hossain, E. (2008), \u201cResource allocation for spectrum underlay in cognitive radio networks\u201d, IEEE Transactions on Wireless Communications, Vol. 7, pp. 5306\u201015.","DOI":"10.1109\/T-WC.2008.070890"},{"key":"key2022021720141971800_b12","unstructured":"Nie, N. and Comaniciu, C. (2005), \u201cAdaptive channel allocation spectrum etiquette for cognitive radio networks\u201d, IEEE DySPAN, pp. 269\u201078."},{"key":"key2022021720141971800_b21","unstructured":"NS\u20102 (1989), The Network Simulator 2, available at: www.isi.edu\/nsnam\/ns\/."},{"key":"key2022021720141971800_b13","doi-asserted-by":"crossref","unstructured":"Shu, T., Krunz, M. and Vrudhula, S. (2006), \u201cJoint optimization of transmit power\u2010time and bit energy efficiency in CDMA wireless sensor networks\u201d, IEEE Transactions on Wireless Communications, Vol. 5, pp. 3109\u201018.","DOI":"10.1109\/TWC.2006.04738"},{"key":"key2022021720141971800_b20","doi-asserted-by":"crossref","unstructured":"Takagi, T. and Sugeno, M. (1985), \u201cFuzzy identification of systems and its applications to modeling and control\u201d, IEEE Transactions on Systems Man and Cybernetics, Vol. 15, pp. 116\u201032.","DOI":"10.1109\/TSMC.1985.6313399"},{"key":"key2022021720141971800_b22","doi-asserted-by":"crossref","unstructured":"Wang, Z., Lu, L. and Bovik, A.C. (2004), \u201cVideo quality assessment based on structural distortion measurement\u201d, Signal Processing, Vol. 19 No. 2, pp. 121\u201032.","DOI":"10.1016\/S0923-5965(03)00076-6"},{"key":"key2022021720141971800_b10","unstructured":"Xiang, J., Zhang, Y. and Skeie, T. (2008), \u201cJoint admission and power control for cognitive radio cellular networks\u201d, IEEE ICCS, pp. 1519\u201023."},{"key":"key2022021720141971800_b14","unstructured":"Yates, R.D. and Goodman, D.J. (2004), Probability and Stochastic Processes: A Friendly Introduction for Electrical and Computer Engineering, 2nd ed., Wiley, New York, NY."},{"key":"key2022021720141971800_b19","doi-asserted-by":"crossref","unstructured":"Zadeh, L. (1965), \u201cFuzzy sets\u201d, Information and Control, Vol. 8 No. 3, pp. 338\u201053.","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"key2022021720141971800_b8","doi-asserted-by":"crossref","unstructured":"Zhang, L., Liang, Y. and Xin, Y. (2007), \u201cJoint admission control and power allocation for cognitive radio networks\u201d, IEEE ICASSP, Vol. 3, pp. 673\u20106.","DOI":"10.1109\/ICASSP.2007.366769"}],"container-title":["International Journal of Pervasive Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/17427371211283047","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17427371211283047\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17427371211283047\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:24:24Z","timestamp":1753403064000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijpcc\/article\/8\/4\/395-414\/163299"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,23]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,11,23]]}},"alternative-id":["10.1108\/17427371211283047"],"URL":"https:\/\/doi.org\/10.1108\/17427371211283047","relation":{},"ISSN":["1742-7371"],"issn-type":[{"type":"print","value":"1742-7371"}],"subject":[],"published":{"date-parts":[[2012,11,23]]}}}