{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:11:40Z","timestamp":1760242300635,"version":"build-2065373602"},"reference-count":15,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T00:00:00Z","timestamp":1490918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the International S&amp;T cooperation Program of China","award":["2013DFA12460"],"award-info":[{"award-number":["2013DFA12460"]}]},{"name":"Zhejiang Provincial Natural Science Foundation of China","award":["LY16F010015"],"award-info":[{"award-number":["LY16F010015"]}]},{"name":"Public Projects of Wenzhou Science &amp; Technology Bureau","award":["Grant No. G20150020&No.G20160007"],"award-info":[{"award-number":["Grant No. G20150020&No.G20160007"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Due to the spectrum varying nature of cognitive radio networks, secondary users are required to perform spectrum handoffs when the spectrum is occupied by primary users, which will lead to a handoff delay. In this paper, based on the multi-armed bandit framework of medium access in decentralized cognitive radio networks, we investigate blind spectrum selection problem of secondary users whose sensing ability of cognitive radio is limited and the channel statistics are a priori unknown, taking the handoff delay as a fixed handoff cost into consideration. In this scenario, secondary users have to make the choice of either staying foregoing spectrum with low availability or handing off to another spectrum with higher availability. We model the problem and investigate the performance of three representative policies, i.e., \u03c1PRE, SL(K), kth-UCB1. The simulation results show that, despite the inclusion of the fixed handoff cost, these policies achieve the same asymptotic performance as that without handoff cost. Moreover, through comparison of these policies, we found the kth-UCB1 policy has better overall performance.<\/jats:p>","DOI":"10.3390\/fi9020010","type":"journal-article","created":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T10:35:49Z","timestamp":1490956549000},"page":"10","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Decentralized Blind Spectrum Selection in Cognitive Radio Networks Considering Handoff Cost"],"prefix":"10.3390","volume":"9","author":[{"given":"Yongqun","family":"Chen","sequence":"first","affiliation":[{"name":"School of Physics and Technology, Wuhan University, Wuhan 430072, China"}]},{"given":"Huaibei","family":"Zhou","sequence":"additional","affiliation":[{"name":"International School of Software, Wuhan University, Wuhan 430072, China"}]},{"given":"Ruoshan","family":"Kong","sequence":"additional","affiliation":[{"name":"International School of Software, Wuhan University, Wuhan 430072, China"}]},{"given":"Li","family":"Zhu","sequence":"additional","affiliation":[{"name":"Oujiang College, Wenzhou University, Chashan University Town, Wenzhou 325035, China"}]},{"given":"Huaqing","family":"Mao","sequence":"additional","affiliation":[{"name":"Oujiang College, Wenzhou University, Chashan University Town, Wenzhou 325035, China"}]}],"member":"1968","published-online":{"date-parts":[[2017,3,31]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2127","DOI":"10.1016\/j.comnet.2006.05.001","article-title":"NeXt Generation\/Dynamic Spectrum Access\/Cognitive Radio Wireless Networks: A Survey","volume":"50","author":"Akyildiz","year":"2006","journal-title":"Comput. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.phycom.2016.05.002","article-title":"A survey on compressive sensing techniques for cognitive radio networks","volume":"20","author":"Salahdine","year":"2016","journal-title":"Phys. Commun."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Arjoune, Y., Kaabouch, N., el Ghazi, H., and Tamtaoui, A. (2017, January 9\u201311). Compressive Sensing: Performance Comparison of Sparse Recovery Algorithms. Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC.2017.7868430"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MWC.2013.6507397","article-title":"Wideband Spectrum Sensing for Cognitive Radio Networks: A Survey","volume":"20","author":"Sun","year":"2013","journal-title":"IEEE Wirel. Commun."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1109\/TSP.2015.2389620","article-title":"The Restless Multi-Armed Bandit Formulation of the Cognitive Compressive Sensing Problem","volume":"63","author":"Bagheri","year":"2015","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Wu, L., Wang, W., and Zhang, Z. (2012, January 1\u20134). A POMDP-Based Optimal Spectrum Sensing and Access Scheme for Cognitive Radio Networks with Hardware Limitation. Proceedings of the 2012 IEEE Wireless Communications and Networking Conference (WCNC), Paris, France.","DOI":"10.1109\/WCNC.2012.6213975"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Liu, K., and Zhao, Q. (2008, January 16\u201320). A Restless Bandit Formulation of Opportunistic Access: Indexablity and Index Policy. Proceedings of the 5th IEEE Annual Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops, SECON Workshops \u201908, San Francisco, CA, USA.","DOI":"10.1109\/SAHCNW.2008.12"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Anandkumar, A., Michael, N., and Tang, A. (2010, January 15\u201319). Opportunistic Spectrum Access with Multiple Users: Learning under Competition. Proceedings of the 2010 IEEE INFOCOM Conference, San Diago, CA, USA.","DOI":"10.1109\/INFCOM.2010.5462144"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"6184","DOI":"10.1109\/TSP.2014.2360821","article-title":"Distributed Stochastic Online Learning Policies for Opportunistic Spectrum Access","volume":"62","author":"Gai","year":"2014","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1013689704352","article-title":"Finite-time analysis of the multiarmed bandit problem","volume":"47","author":"Auer","year":"2002","journal-title":"Mach. Learn."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1007\/s11277-016-3301-1","article-title":"QoS-Based Blind Spectrum Selection with Multi-armed Bandit Problem in Cognitive Radio Networks","volume":"89","author":"Chen","year":"2016","journal-title":"Wirel. Pers. Commun."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1109\/JSAC.2011.110406","article-title":"Distributed Algorithms for Learning and Cognitive Medium Access with Logarithmic Regret","volume":"29","author":"Anandkumar","year":"2011","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Liu, K., and Zhao, Q. (February, January 31). Decentralized Multi-Armed Bandit with Multiple Distributed Players. Proceedings of the 2010 Information Theory and Applications Workshop (ITA), La Jolla, CA, USA.","DOI":"10.1109\/ITA.2010.5454071"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2331","DOI":"10.1109\/TIT.2014.2302471","article-title":"Decentralized learning for multiplayer multiarmed bandits","volume":"60","author":"Kalathil","year":"2014","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1109\/9.7243","article-title":"Asymptotically efficient adaptive allocation rules for the multiarmed bandit problem with switching cost","volume":"33","author":"Agrawal","year":"1988","journal-title":"IEEE Trans. Autom. Control"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/9\/2\/10\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:31:42Z","timestamp":1760207502000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/9\/2\/10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,31]]},"references-count":15,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,6]]}},"alternative-id":["fi9020010"],"URL":"https:\/\/doi.org\/10.3390\/fi9020010","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2017,3,31]]}}}