CN101778396B - Method for detecting cognitive user in opportunity spectrum sharing system - Google Patents

Method for detecting cognitive user in opportunity spectrum sharing system Download PDF

Info

Publication number
CN101778396B
CN101778396B CN2010100183235A CN201010018323A CN101778396B CN 101778396 B CN101778396 B CN 101778396B CN 2010100183235 A CN2010100183235 A CN 2010100183235A CN 201010018323 A CN201010018323 A CN 201010018323A CN 101778396 B CN101778396 B CN 101778396B
Authority
CN
China
Prior art keywords
user
channel
cognitive user
cognitive
main
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2010100183235A
Other languages
Chinese (zh)
Other versions
CN101778396A (en
Inventor
孙君
朱洪波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN2010100183235A priority Critical patent/CN101778396B/en
Publication of CN101778396A publication Critical patent/CN101778396A/en
Application granted granted Critical
Publication of CN101778396B publication Critical patent/CN101778396B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method for detecting a cognitive user in an opportunity spectrum sharing system, which relates to a design method for detecting a master user and sending data information frame length by the cognitive user (secondary user) in a system based on an opportunity spectrum access (OSA) technique in a cognitive network. The method comprises the following steps of: firstly, analyzing the testing frequency based the signal interference noise ratio of the secondary user; and secondly, defining the frame length of data transmission of the secondary user based on the testing frequency and the spectral optimization. A control channel is needed to be added in a single-channel multi-user scene, the selection and the scheduling of users are performed first, and then a method for detecting a single user is implemented. The basic thought of the method that the occupation condition of an authorized channel by the master user and the influence on the signal interference noise ratio (SINR) of the secondary user by the master user are analyzed, and thus the detection frequency and the transmission frame length of the secondary user are designed, and an optimizing and compromising scheme is found between the throughput of the secondary user and the collision probability with the master user.

Description

The detection method of cognitive user in opportunity spectrum sharing system
Technical field
The present invention relates generally in a kind of cognition network and insert the method for designing that cognitive user (inferior user) detected and sent the data message frame length in (OSA) technological system to main user based on opportunistic spectrum.The basic thought of this method is to analyze main user the influence to inferior subscriber signal interference-to-noise ratio (SINR) is appearred in the occupancy and the main user of authorization channel; And design time user with this and detect frequency and transmission frame length, inferior user throughput and and main user's collision probability between find and optimize and the scheme of compromise.
Background technology
Opportunistic spectrum access (OSA) technology is meant and need not cooperation between the primary and secondary user that inferior user acts according to circumstances and uses main user's frequency spectrum resource.Main user need not to know time user's existence, brings additional overhead can for main user.Inferior user at first intercepts local frequency spectrum, searching idle channel before access; If there is idle channel, just inferior user inserts; If temporarily do not have, just inferior user waits for that main user discharges channel; In inferior telex network process, in case main user need take the channel that time user is using, inferior user this channel of rapid release at the appointed time supplies main user to use.Therefore; In the OSA system; Inferior user need detect main user in time, and inferior user's detection time, the frame length that detects frequency and inferior user data transmission all have fundamental influence to inferior user's transmission quality itself and to main user's interference and transmission quality.
If detection time is long, frequency is high, the detection probability of cognitive nodes is high, just can protect authorized user better.Simultaneously, this can bring time user to transmit the increase of interruption frequency, and the throughput of inferior user service data transmission reduces, and brings time delay thus.Therefore, as far as inferior user, hope to have a rational transmission time and detection frequency, feasible time user can have as far as possible more chances of transmitting data continuously, transmits more business datum, and try one's best minimizing and main user's collision.
Same problem is present in single user's single channel applied environment and the multi-user competes the single channel environment, and the basic thought of the design under the different scenes is consistent, but between the multi-user, need carry out necessary scheduling and coordination.
Summary of the invention
Technical problem: the purpose of this invention is to provide the detection method of a kind of cognitive user in opportunity spectrum sharing system; This method is to insert the method for designing that cognitive user (inferior user) detected and sent the data message frame length in (OSA) technological system to main user based on opportunistic spectrum in the cognition network; This method addresses the above problem and/or shortcoming, and the detection method that time user takes into account the increase throughput, reduces interference and conflict in a kind of cognition network is provided.
Technical scheme: the detection method of cognitive user of the present invention in opportunity spectrum sharing system is based on above consideration; Solution is in wireless cognition network; Between inferior user or inferior user, main user detected the design of frequency and time user's transmission frame length, reach time user throughput and and main user's collision probability between optimization and compromise.
This method comprises two parts: the one, detect frequency from inferior subscriber signal interference-to-noise ratio angle analysis; The 2nd, from detecting the frame length of frequency and frequency spectrum optimization viewpoint definition time user data transmission; In single channel multi-user scene, needing increases control channel, at first carries out user's selection and scheduling, implements the detection method of unique user again, is specially:
1). single channel list user scene
Step 1: inferior user detects main user in the time at i, judges whether to exist main user, if exist main user to continue the detection of next i time; If do not exist time user according to main user to channel take rule and the channel conditions of self calculates its frame length T;
Step 2: based on Mathematical Modeling and the probabilistic method of main user to channel occupancy; Calculate the average time user of time user when bumping Signal Interference and Noise Ratio SINR with main user, and the average SINR of inferior user when not bumping with main user;
Step 3: calculate the average boundary that can reach maximum throughput when time user and main user do not bump based on the average SINR of inferior user when not bumping with main user;
Step 4:, obtain the optimum time user's frame length that obtains from the spectrum efficiency optimal angle according to optimization criterion;
Step 5: according to the average SINR of inferior user when bumping with main user, and the average SINR of inferior user when not bumping with main user, in conjunction with the second-order statistics of SINR, calculate the inferior user who obtains from the SINR statistical property and detect frequency;
Step 6: detect at optimum the user's frame length that obtains from the spectrum efficiency optimal angle with from the inferior user that the SINR statistical property obtains and to get minimum value between frequency and obtain final inferior user's frame length T; After calculating T, carry out transfer of data in the time at T-i; After the transfer of data of a frame is intact, judge whether time user's data has been transmitted, if transmitted, inferior user sends CTS message to authorization channel, withdraws from this authorization channel; If inferior user data has not transmitted, then repeat above detection and transmission course,
2). single channel multi-user scene
In single channel multi-user scene, the practical implementation step of inferior user's detection method is:
Step 7: distribute time slot i by control channel; N time user who exists in the current system in time at i carries out joint-detection to authorization channel; And the result fed back to control channel; Carry out data fusion and judge whether main user exists by control channel, if exist then proceed joint-detection in the next i time; If do not exist; Control channel is selected best access time user i according to optimizing utility function
Figure G2010100183235D00021
, and sends RTS/CTS message to i;
Step 8: selected inferior user carries out the detection step in single user's scene after receiving the message of control channel, inferior user i according to main user to channel take rule and the channel conditions of self calculates its frame length T i, and at T iThe data of transmission time user i in the-i;
Step 9: when a frame data end of transmission, system judges whether all data of time user i have been transmitted, if transmitted; Inferior user sends CTS message to control channel; Withdraw from this authorization channel, control channel upgrades user's combination, and gets into new round detection and transmission course; If inferior user data has transmitted, then continue above detection of repetition and transmission course.
Beneficial effect: experimental result proves, this scheme has realized that the effective collision between inferior user and main user suppresses, frequency spectrum share efficiently, and between inferior user, realized the fairness and the low probability conflict of competition.And the scheme that the present invention proposes does not have extra increase primary and secondary user's expense, only need increase a control channel in multi-user's scene, realizes that cost and complexity are low.
Description of drawings
Through below in conjunction with the accompanying drawing and the detailed description of carrying out, it is clearer that above and other objects of the present invention, characteristics and advantage will become, wherein;
Fig. 1 shows single CU authorization channel and detects the frame structure case of authorization channel.
Fig. 2 shows the frame structure case that the multi-user takies authorization channel and detects authorization channel.
Fig. 3 shows scheme flow chart among Fig. 1.
Fig. 4 shows scheme flow chart among Fig. 2.
Embodiment
Fig. 1 shows that single main CU authorization channel and single user detect authorization channel and in the frame structure case of authorization channel transmission data.With reference to Fig. 1, main user takies index of coincidence on-off discharge model to authorization channel.Main CU channel in this model, the average duration of promptly opening is β 0Main user is busy channel not, and the average duration of promptly closing is β i, main user is t by busy channel to discharging the used time of channel, its obeys index distribution.Suppose that time user's frame length is T, the t millisecond time is used for the detection to main subscriber channel before the transmission data.When detecting main user and not existing, transmit time user data in the time at T-i, in the transmission data procedures, main user can occur at any time, and the primary and secondary user data package can bump and made time user's data packet loss this moment.Frame length T has not only determined inferior user to transmit data length (inferior user throughput) but also has determined the frequency (collision probability) that inferior user detects main user.Fig. 2 shows single authorization channel multi-user's case.With reference to Fig. 2, also there is race problem between time user simultaneously in the same problem of confirming frame length T that exists.
At first, here the term definition of definition is following:
SINR: inferior user's Signal Interference and Noise Ratio
γ:SINR
β 0: the average duration of main CU channel
β i: main user discharges the average duration of channel
T: main user by busy channel to discharging the used time of channel
Tt: main user is by discharging channel to the used time of busy channel
I: inferior user is to main user's detection time
T: inferior user's frame length
I: i time user
T i: the frame length of inferior user i
P 0: main user is in the received power of inferior user's receiving terminal
P s: inferior user is in the received power of inferior user's receiving terminal
N: system is number of users last time
N 0: AWGN power
N j: the SINR level passes through SINR thresholding γ jLevel crossing rate
P (): probability density function
F (): exponential distribution function
B: the channel width of authorization channel
γ c(T, τ, P s, P 0): time user's instantaneous SINR when bumping with main user
Time user's average SINR when
Figure G2010100183235D00041
bumps with main user
γ Nc(T, τ, P s, P 0): time user's instantaneous SINR when not bumping with main user
Figure G2010100183235D00042
average SINR of time user when not bumping with main user
Figure G2010100183235D00043
when not bumping with main user time user can reach the on average lower bound of throughput
Figure G2010100183235D00044
when not bumping with main user i user when optimum frame length, can reach the on average lower bound of throughput
T *: the inferior user's that the optimization throughput obtains optimum frame length
T i *: i time user's that the optimization throughput obtains optimum frame length
DF (P s, P 0): the inferior user's who obtains according to second-order statistics frame length
f D: the maximum doppler frequency of fading channel
The average SINR of
Figure G2010100183235D00045
fading channel
RTS/CTS: request transmission/clear to send
The design that inferior user detected and sent the data message frame length is following:
1. single user's single channel scenario:
With reference to Fig. 1, in the time, when main user occurred, inferior user's SINR was expressed as at T
Because t obeys following exponential distribution
Figure G2010100183235D00047
Average SINR when bumping at this moment, is expressed as
Figure G2010100183235D00048
Figure G2010100183235D00049
Figure G2010100183235D000410
Likewise, in the time, when main user did not occur, inferior user's SINR was expressed as at T
Figure G2010100183235D00051
Tt obeys following exponential distribution
f ( tt ) = 1 β 1 exp ( - tt β 1 ) dt
Average SINR when not bumping at this moment, is expressed as
Figure G2010100183235D00054
The corresponding time user of this SINR can reach one of throughput on average lower bound, promptly
Figure G2010100183235D00055
Inferior user is in the wireless authorization channel, and its characteristic of channel is consistent with the fading channel characteristic, and under the fading channel condition, the second-order statistics of inferior user SINR comprises two important parameters of the level crossing rate and the average duration of fading.
Inferior user's frame length T is by following formula definition
T=min(T *,DF(P s,P 0))
T *Obtain by following optimization
Figure G2010100183235D00056
DF (P s, P 0) obtain by following formula
Figure G2010100183235D00057
At this,
N j = 2 π γ j γ ‾ f D e - γ j / γ ‾
2. multi-user's single channel scenario
Each time user's frame length is definite consistent with single user's single channel scenario in multi-user's single channel scenario, and different is scheduling and the distribution that between inferior user, has increased MAC, to avoid the collision between time user.For this reason, need a control channel.With reference to Fig. 2; Participate in the individual time joint detection of users authorization channel of N of application authorization channel in time and testing result is sent to control channel at i; Control channel obtains the result to main user's detection through data fusion, if main user does not occur, according to the utility function of the maximization availability of frequency spectrum
arg max i ( R min ‾ ( T i * ) ) i
Select the best channel time user i that uses, and through send the RTS/CTS order to inferior user i.When the frame length end of transmission of inferior user i, above process repeats, and selects the use time user and the corresponding frame length of next frame.
Preferential embodiment of the present invention is here described below with reference to accompanying drawings.Because known function and structure make the present invention fuzzy in unnecessary details, therefore they are described no longer in the specification below.
A. single channel list user scene
With reference to Fig. 3, the practical implementation step of time user's detection scheme is in single channel list user scene:
In step 310, inferior user detects main user in the time at i.In step 312, judge whether to have main user, if having main user then return step 310; If do not exist then time user carries out transfer of data at the T-i that calculates in the time.After the transfer of data of a frame is intact, judge in step 316 whether all data of time user have been transmitted, get into step 318 if transmitted, inferior user sends CTS message to authorization channel, withdraws from this authorization channel.If inferior user data has not transmitted, then get into step 310, repeat above the detection and transmission course.
B. single channel multi-user scene
With reference to Fig. 4; The practical implementation step of time user's detection scheme is in single channel multi-user scene: in step 410; Distribute time slot i by control channel; N time user who exists in the current system in time at i carries out joint-detection to authorization channel, and the result is fed back to control channel, carried out data fusion and judged in step 412 whether main user exists by control channel.If exist then return step 410; If do not exist; In step 414; Control channel is selected best access time user i according to utility function , and sends RTS/CTS message to i.After receiving message, inferior user i is according to the corresponding frame length T of state computation of oneself i, and in Ti-i the data of transmission time user i.Whether all data of in step 418, judging time user i have been transmitted, and get into step 420 if transmitted, and inferior user sends CTS message to control channel, withdraws from this authorization channel, and control channel upgrades user's combination in step 422, and gets into step 410 again.If inferior user data has not transmitted, then get into step 410, repeat above the detection and transmission course.

Claims (1)

1. the detection method of a cognitive user in opportunity spectrum sharing system is characterized in that this method comprises two parts: the one, detect frequency from cognitive user Signal Interference and Noise Ratio angle analysis; The 2nd, from detecting the frame length of frequency and frequency spectrum optimization viewpoint definition cognitive user transfer of data; In single channel multi-user scene, needing increases control channel, at first carries out user's selection and scheduling, implements the detection method of unique user again, is specially:
1). single channel list user scene
Step 1: cognitive user detects main user in the time at t, judges whether to exist main user, if exist main user to continue the detection of next t time; If do not exist cognitive user according to main user to channel take rule and the channel conditions of self calculates its frame length T;
Step 2: based on Mathematical Modeling and the probabilistic method of main user to channel occupancy; Calculate the Signal Interference and Noise Ratio SINR of the average cognitive user of cognitive user when bumping with main user, and the average SINR of cognitive user when not bumping with main user;
Step 3: calculate the average boundary that can reach maximum throughput when cognitive user and main user do not bump according to the average SINR of cognitive user when not bumping with main user;
Step 4:, obtain the optimum cognitive user frame length that obtains from the spectrum efficiency optimal angle according to optimization criterion;
Step 5: the average SINR of cognitive user when bumping with main user, and the average SINR of cognitive user when not bumping with main user, in conjunction with the second-order statistics of SINR, calculate the cognitive user that obtains from the SINR statistical property and detect frequency;
Step 6: obtain getting minimum value between cognitive user detection frequency at the optimum cognitive user frame length that obtains from the spectrum efficiency optimal angle with from the SINR statistical property and obtain final cognitive user frame length T; After calculating T, carry out transfer of data in the time at T-t; After the transfer of data of a frame is intact, judge whether the data of cognitive user have been transmitted, if transmitted, cognitive user is sent CTS message to authorization channel, withdraws from this authorization channel; If the cognitive user data have not been transmitted, then repeat above detection and transmission course,
2). single channel multi-user scene
In single channel multi-user scene, the practical implementation step of cognitive user detection method is:
Step 7: distribute time slot t by control channel; N cognitive user in that t existed in the current system in the time carried out joint-detection to authorization channel; And the result fed back to control channel; Carry out data fusion and judge whether main user exists by control channel, if exist then proceed joint-detection in the next t time; If do not exist; Control channel is selected best access cognitive user i according to optimizing utility function
Figure FSB00000705088900011
, and sends RTS/CTS message to i;
Figure FSB00000705088900012
is: i cognitive user can reach the on average lower bound of throughput when not bumping with main user when optimum frame length;
Step 8: selected cognitive user is carried out the detection step in single user's scene after receiving the message of control channel, cognitive user i according to main user to channel take rule and the channel conditions of self calculates its frame length T i, and at T iThe data of transmitting cognitive user i in the-t;
Step 9: when a frame data end of transmission, system judges whether all data of cognitive user i have been transmitted, if transmitted; Cognitive user is sent CTS message to control channel; Withdraw from this authorization channel, control channel upgrades user's combination, and gets into new round detection and transmission course; If the cognitive user data have been transmitted, then continue above detection of repetition and transmission course.
CN2010100183235A 2010-01-13 2010-01-13 Method for detecting cognitive user in opportunity spectrum sharing system Expired - Fee Related CN101778396B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010100183235A CN101778396B (en) 2010-01-13 2010-01-13 Method for detecting cognitive user in opportunity spectrum sharing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010100183235A CN101778396B (en) 2010-01-13 2010-01-13 Method for detecting cognitive user in opportunity spectrum sharing system

Publications (2)

Publication Number Publication Date
CN101778396A CN101778396A (en) 2010-07-14
CN101778396B true CN101778396B (en) 2012-05-09

Family

ID=42514674

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010100183235A Expired - Fee Related CN101778396B (en) 2010-01-13 2010-01-13 Method for detecting cognitive user in opportunity spectrum sharing system

Country Status (1)

Country Link
CN (1) CN101778396B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102711120B (en) * 2012-05-23 2014-11-12 西安电子科技大学 Cooperative frequency spectrum sensing method based on DS (Dempter-Shafer) evidence theory
CN102883451B (en) * 2012-10-12 2015-04-15 南京邮电大学 Cross layer design method of up resources of shared system by terminal direction connection technology
CN104244431B (en) * 2013-06-24 2017-12-19 电信科学技术研究院 Transmission dispatching method and device in cognitive radio system
WO2015152806A2 (en) * 2014-03-31 2015-10-08 Telefonaktiebolaget L M Ericsson (Publ) Enhanced grant detection method
CN105592563B (en) * 2014-10-21 2018-12-14 中国人民解放军理工大学 A kind of multi-user's opportunistic spectrum access method
CN104702395B (en) * 2015-03-26 2018-06-05 山东大学 Fair and high efficiency federated resource distribution method in a kind of cooperative cognitive network
US10231131B2 (en) * 2017-01-13 2019-03-12 Qualcomm Incorporated Autonomous uplink (UL) transmission in new radio-spectrum sharing (NR-SS)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101404513A (en) * 2008-10-21 2009-04-08 浙江大学 Fast multi-signal channel combined detection method based on illation in cognition radio communication system
CN101489234A (en) * 2009-01-16 2009-07-22 清华大学 Opportunistic spectrum access method based on collision probability constraint

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101404513A (en) * 2008-10-21 2009-04-08 浙江大学 Fast multi-signal channel combined detection method based on illation in cognition radio communication system
CN101489234A (en) * 2009-01-16 2009-07-22 清华大学 Opportunistic spectrum access method based on collision probability constraint

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Alireza Attar et al.Cognitive Radio Game for Secondary Spectrum Access Problem.《IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS》.2009,第8卷(第4期),第64-75页. *
Stefano Buzzi et al.Noncooperative Waveform Adaptation Games in Multiuser Wireless Communications.《IEEE SIGNAL PROCESSING MAGAZINE》.2009,第64-75页. *

Also Published As

Publication number Publication date
CN101778396A (en) 2010-07-14

Similar Documents

Publication Publication Date Title
CN101778396B (en) Method for detecting cognitive user in opportunity spectrum sharing system
CN101527915B (en) Band dynamic selecting and time scheduling method in heterogeneous network
US9706575B2 (en) Multiple access method and system with frequency multiplexing of several request to send messages per source node
Kim et al. Coordinated multichannel MAC protocol for vehicular ad hoc networks
CN104994591A (en) Adjustment method, adjustment system of channel acquisition probability and base station
Ye et al. Congestion control to achieve optimal broadcast efficiency in VANETs
CN109548156B (en) Single-channel Time Division Multiple Access (TDMA) satellite cluster ad hoc network time slot resource allocation method
CN108401277A (en) The method and device of wireless network access, terminal device
WO2016070772A1 (en) Method and device for performing carrier scheduling
EP3247157B1 (en) Method for managing wireless resources, and access point using same
Li et al. An RSU-coordinated synchronous multi-channel MAC scheme for vehicular ad hoc networks
CN107734704A (en) Resource distribution and data transmission method and device, base station, terminal for V2X
Kaynia et al. Performance of ALOHA and CSMA in spatially distributed wireless networks
Kim et al. Performance analysis of fair medium access control protocol for asymmetric full duplex in WLAN
Javed et al. Performance analysis of an adaptive rate-range control algorithm for VANET safety applications
Javed et al. Performance analysis of a time headway based rate control algorithm for VANET safety applications
EP2359543B1 (en) A method for estimation of residual bandwitdth
CN104066198A (en) Method and system for selecting signal channel in wireless local area network
CN109862534A (en) Resource allocation method and device
Aydogdu et al. Goodput and throughput comparison of single‐hop and multi‐hop routing for IEEE 802.11 DCF‐based wireless networks under hidden terminal existence
Li et al. Contention based uplink transmission with NOMA for latency reduction
Hung et al. Performance modeling and analysis of the IEEE 802.11 distribution coordination function in presence of hidden stations
CN109951864A (en) The system performance analysis method coexisted based on the imperfect spectrum detection of LAA and WiFi
Khalaf et al. Throughput and delay analysis of multihop IEEE 802.11 networks with capture
Shah et al. Performance and complexity analysis of MAC protocol for VANETs

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20100714

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000207

Denomination of invention: Method for detecting cognitive user in opportunity spectrum sharing system

Granted publication date: 20120509

License type: Common License

Record date: 20161109

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
EC01 Cancellation of recordation of patent licensing contract
EC01 Cancellation of recordation of patent licensing contract

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000207

Date of cancellation: 20180116

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120509

Termination date: 20180113