Applying Periodic Retraining to Survival Analysis-Based Dynamic Spectrum Access Algorithms

Michael V. Lipski, Ram M. Narayanan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

In situations of spectrum scarcity, tactical networks must use available spectrum efficiently while still maintaining hierarchical access and minimal interference between users. We present simulation results for survival analysis-based dynamic spectrum access algorithms that were previously described in literature. We demonstrate the efficacy of using much shorter training sequences to build the non-parametric estimate of the cumulative hazard function, which is then used to predict remaining idle time. The algorithms are tested on simulated spectrum occupancy data that features time-varying mean occupied and vacant period lengths. We also introduce periodic retraining in order to adapt to changing channel conditions. Our results clearly demonstrate the benefits of periodically rebuilding the estimate of the cumulative hazard function, which requires data that is already gathered in the course of normal operation.

Original languageEnglish (US)
Title of host publication2018 IEEE Military Communications Conference, MILCOM 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages871-876
Number of pages6
ISBN (Electronic)9781538671856
DOIs
StatePublished - Jul 2 2018
Event2018 IEEE Military Communications Conference, MILCOM 2018 - Los Angeles, United States
Duration: Oct 29 2018Oct 31 2018

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM
Volume2019-October

Conference

Conference2018 IEEE Military Communications Conference, MILCOM 2018
Country/TerritoryUnited States
CityLos Angeles
Period10/29/1810/31/18

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Applying Periodic Retraining to Survival Analysis-Based Dynamic Spectrum Access Algorithms'. Together they form a unique fingerprint.

Cite this