{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:42:55Z","timestamp":1761745375112,"version":"3.41.2"},"reference-count":41,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T00:00:00Z","timestamp":1613692800000},"content-version":"vor","delay-in-days":49,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100008778","name":"University of Science and Technology Beijing","doi-asserted-by":"publisher","award":["BK19CF002"],"award-info":[{"award-number":["BK19CF002"]}],"id":[{"id":"10.13039\/501100008778","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>The cognitive radio network (CRN) is aimed at strengthening the system through learning and adjusting by observing and measuring the available resources. Due to spectrum sensing capability in CRN, it should be feasible and fast. The capability to observe and reconfigure is the key feature of CRN, while current machine learning techniques work great when incorporated with system adaption algorithms. This paper describes the consensus performance and power control of spectrum sharing in CRN. (1) CRN users are considered noncooperative users such that the power control policy of a primary user (PU) is predefined keeping the secondary user (SU) unaware of PU\u2019s power control policy. For a more efficient spectrum sharing performance, a deep learning power control strategy has been developed. This algorithm is based on the received signal strength at CRN nodes. (2) An agent\u2010based approach is introduced for the CR user\u2019s consensus performance. (3) All agents reached their steady\u2010state value after nearly 100 seconds. However, the settling time is large. Sensing delay of 0.4 second inside whole operation is identical. The assumed method is enough for the representation of large\u2010scale sensing delay in the CR network.<\/jats:p>","DOI":"10.1155\/2021\/7125482","type":"journal-article","created":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T01:04:58Z","timestamp":1613783098000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A Deep Learning\u2010Based Power Control and Consensus Performance of Spectrum Sharing in the CR Network"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8711-2907","authenticated-orcid":false,"given":"Muhammad Muzamil","family":"Aslam","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7804-962X","authenticated-orcid":false,"given":"Liping","family":"Du","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6335-3933","authenticated-orcid":false,"given":"Zahoor","family":"Ahmed","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1782-4658","authenticated-orcid":false,"given":"Muhammad Nauman","family":"Irshad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5047-9203","authenticated-orcid":false,"given":"Hassan","family":"Azeem","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,2,19]]},"reference":[{"key":"e_1_2_8_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2949279"},{"key":"e_1_2_8_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2943559"},{"key":"e_1_2_8_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2020.3002955"},{"key":"e_1_2_8_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2020.02.005"},{"key":"e_1_2_8_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2016.2543732"},{"key":"e_1_2_8_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2911109"},{"key":"e_1_2_8_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2019.100953"},{"key":"e_1_2_8_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2922773"},{"key":"e_1_2_8_9_2","doi-asserted-by":"crossref","unstructured":"KondareddyY. R. AgrawalP. andSivalingamK. Cognitive radio network setup without a common control channel MILCOM 2008 - 2008 IEEE Military Communications Conference 2008 San Diego CA 1\u20136 https:\/\/doi.org\/10.1109\/MILCOM.2008.4753398 2-s2.0-78650759499.","DOI":"10.1109\/MILCOM.2008.4753398"},{"key":"e_1_2_8_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2481722"},{"key":"e_1_2_8_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.100811.101381"},{"key":"e_1_2_8_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2855683"},{"key":"e_1_2_8_13_2","doi-asserted-by":"crossref","unstructured":"IslamM. H. LiangY. andHoangA. T. Distributed power and admission control for cognitive radio networks using antenna arrays 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks 2007 Dublin 250\u2013253 https:\/\/doi.org\/10.1109\/DYSPAN.2007.40 2-s2.0-34548809254.","DOI":"10.1109\/DYSPAN.2007.40"},{"key":"e_1_2_8_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2898999"},{"key":"e_1_2_8_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1925-3_11"},{"key":"e_1_2_8_16_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2012.0780"},{"key":"e_1_2_8_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2334397"},{"key":"e_1_2_8_18_2","doi-asserted-by":"crossref","unstructured":"GummesonJ. GanesanD. CornerM. D. andShenoyP. An adaptive link layer for range diversity in multi-radio mobile sensor networks IEEE INFOCOM 2009 2009 Rio De Janeiro Brazil 154\u2013162 https:\/\/doi.org\/10.1109\/INFCOM.2009.5061917 2-s2.0-70349668914.","DOI":"10.1109\/INFCOM.2009.5061917"},{"key":"e_1_2_8_19_2","first-page":"10","article-title":"Cost effective & energy efficient intelligent smart home system based on IoT","volume":"3","author":"Aslam M. M.","year":"2020","journal-title":"Afyon Kocatepe University International Journal of Engineering Technology and Applied Sciences"},{"key":"e_1_2_8_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2487047"},{"key":"e_1_2_8_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecoenv.2019.109733"},{"key":"e_1_2_8_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.11.023"},{"key":"e_1_2_8_23_2","first-page":"16","article-title":"Intelligent wireless communications enabled by cognitive radio and machine learning","volume":"15","author":"Zhou X.","year":"2018","journal-title":"China Communications"},{"volume-title":"Reinforcement Learning: An Introduction","year":"1998","author":"Barto R.","key":"e_1_2_8_24_2"},{"key":"e_1_2_8_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2751058"},{"key":"e_1_2_8_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.05776"},{"key":"e_1_2_8_27_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2018.5166"},{"key":"e_1_2_8_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055652"},{"key":"e_1_2_8_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2825559"},{"key":"e_1_2_8_30_2","doi-asserted-by":"crossref","unstructured":"YuQ. ChenJ. FanY. ShenX. andSunY. Multi-channel assignment in wireless sensor networks: a game theoretic approach 2010 Proceedings IEEE INFOCOM 2010 San Diego CA 1\u20139 https:\/\/doi.org\/10.1109\/INFCOM.2010.5461935 2-s2.0-77953304290.","DOI":"10.1109\/INFCOM.2010.5461935"},{"key":"e_1_2_8_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2594759"},{"key":"e_1_2_8_32_2","unstructured":"MnihV.et al. Playing Atari with deep reinforcement learning 2013 1\u20139 https:\/\/arxiv.org\/abs\/1312.5602."},{"key":"e_1_2_8_33_2","first-page":"1329","article-title":"Benchmarking deep reinforcement learning for continuous control","volume":"48","author":"Duan Y.","year":"2016","journal-title":"International Conference on Machine Learning, PMLR"},{"key":"e_1_2_8_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2020.2981320"},{"key":"e_1_2_8_35_2","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/6024928"},{"key":"e_1_2_8_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.834113"},{"key":"e_1_2_8_37_2","doi-asserted-by":"crossref","unstructured":"GivanB.andParrR. Introduction POMDP.pdf 2001 1\u201323.","DOI":"10.1002\/9780470690628.ch1"},{"key":"e_1_2_8_38_2","article-title":"Frequency domain analysis of resilient consensus in multi-agent systems subject to an integrity attack","author":"Ahmed Z.","year":"2020","journal-title":"ISA Transactions"},{"key":"e_1_2_8_39_2","unstructured":"ChoiD. Model-based-RL-deepmind 2016 1\u201313."},{"key":"e_1_2_8_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.834433"},{"key":"e_1_2_8_41_2","doi-asserted-by":"publisher","DOI":"10.1515\/9781400841356.38"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/7125482.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/7125482.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/7125482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:20:28Z","timestamp":1723029628000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/7125482"}},"subtitle":[],"editor":[{"given":"Longzhe","family":"Han","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/7125482"],"URL":"https:\/\/doi.org\/10.1155\/2021\/7125482","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2019-12-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-23","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-02-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"7125482"}}