Yenumula B. Reddy

Learn More
The efficient utilization of underutilized spectrum is the main theme of current research. The cognitive radio with the help of Q-learning algorithm is used to detect the presence of primary signals and utilize the spectrum in the absence of primary signals. The proposed Q-learning algorithm model identifies previously known signals and learns to detect the(More)
Wireless sensor networks has grown a lot in recent years and offers excellent opportunities in defense related applications such as monitoring environment and collecting data related to antisocial activities. Currently, the needs of wireless sensors have become inevitable in daily life. With the continuous growth of Wireless sensor networks in daily life,(More)
In this paper subcarrier and power allocation to each user at base-station maximizes the user data rates, subject to constraints on total power and bit error rate. First, each subchannel is assigned to the user with best channel-to-noise ratio for the channel, with random power distributed by water filling algorithm. The Gao's (2006) subcarrier allocation(More)
The problem of detecting malicious nodes in wireless sensor networks is considered. Since current security mechanisms are inadequate for wireless sensor networks, we must develop a new framework to detect malicious nodes using Zero-Sum game approach and selective node acknowledgements in the forward data path. The first few sections of the paper provide a(More)
Trust is very important in wireless sensor networks to transfer the data from source to destination. The Dynamic Source Protocol calculates the alternate path, if any node fails to transfer the data. The Dynamic Source Protocol does not have any built-in functionality to calculate an alternate path if the path has a malicious node. With the expense of an(More)
Social networks help to bring the special interest groups on a common platform to develop their businesses, share common interest, and bridge the communication. Once you are inside this online community, you can begin to create your own interest group network of friends and eliminate members that do not share common interests or goals. Most popular sites to(More)
Power control at the MAC layer in multi-hop transmissions and interference limited link rates of cognitive wireless networks is an important task in cross-layer design. This paper examines the per-node optimal transmission power such that the resulting power consumption may help provide better service in transmission. We examined optimal transmission of(More)
A novel genetic algorithm application is proposed for adaptive power and subcarrier allocation in multi-user OFDM systems. The proposed method is compared with Eshan's [Ehsan Bakhtiari and Babak H. Khalaj, "A new Joint Power and Subcarrier Allocation Scheme for Multiuser OFDM Systems", 14th IEEE Proceedings on Personal, Indoor and Mobile Radio(More)