![Sensors | Free Full-Text | Cooperative Feedback Bits Allocation and Transmit Power Control in Underlay Cognitive Radio Networks Sensors | Free Full-Text | Cooperative Feedback Bits Allocation and Transmit Power Control in Underlay Cognitive Radio Networks](https://www.mdpi.com/sensors/sensors-18-01809/article_deploy/html/images/sensors-18-01809-g001.png)
Sensors | Free Full-Text | Cooperative Feedback Bits Allocation and Transmit Power Control in Underlay Cognitive Radio Networks
![A Cognitive Radio Network Architecture with Primary and Secondary User... | Download Scientific Diagram A Cognitive Radio Network Architecture with Primary and Secondary User... | Download Scientific Diagram](https://www.researchgate.net/publication/264824800/figure/fig2/AS:295829765148672@1447542720040/A-Cognitive-Radio-Network-Architecture-with-Primary-and-Secondary-User-Networks.png)
A Cognitive Radio Network Architecture with Primary and Secondary User... | Download Scientific Diagram
![Analysis of spectrum allocation of secondary users based on linear cooperative spectrum sensing techniques in cognitive radio networks Analysis of spectrum allocation of secondary users based on linear cooperative spectrum sensing techniques in cognitive radio networks](https://www.peertechzpublications.com/articles/figures/TCSIT-6-135-g002.gif)
Analysis of spectrum allocation of secondary users based on linear cooperative spectrum sensing techniques in cognitive radio networks
![A survey on security attacks and countermeasures with primary user detection in cognitive radio networks | EURASIP Journal on Information Security | Full Text A survey on security attacks and countermeasures with primary user detection in cognitive radio networks | EURASIP Journal on Information Security | Full Text](https://media.springernature.com/lw685/springer-static/image/art%3A10.1186%2Fs13635-015-0021-0/MediaObjects/13635_2015_21_Fig1_HTML.gif)
A survey on security attacks and countermeasures with primary user detection in cognitive radio networks | EURASIP Journal on Information Security | Full Text
![Algorithms | Free Full-Text | Primary User Localization Algorithm Based on Compressive Sensing in Cognitive Radio Networks Algorithms | Free Full-Text | Primary User Localization Algorithm Based on Compressive Sensing in Cognitive Radio Networks](https://www.mdpi.com/algorithms/algorithms-09-00025/article_deploy/html/images/algorithms-09-00025-g001.png)
Algorithms | Free Full-Text | Primary User Localization Algorithm Based on Compressive Sensing in Cognitive Radio Networks
![Cooperative Detection for Primary User in Cognitive Radio Networks | EURASIP Journal on Wireless Communications and Networking | Full Text Cooperative Detection for Primary User in Cognitive Radio Networks | EURASIP Journal on Wireless Communications and Networking | Full Text](https://media.springernature.com/lw685/springer-static/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Fig1_HTML.jpg)
Cooperative Detection for Primary User in Cognitive Radio Networks | EURASIP Journal on Wireless Communications and Networking | Full Text
![A Cognitive Radio Network Architecture with Primary and Secondary User... | Download Scientific Diagram A Cognitive Radio Network Architecture with Primary and Secondary User... | Download Scientific Diagram](https://www.researchgate.net/profile/Natarajan-Meghanathan/publication/264824800/figure/fig2/AS:295829765148672@1447542720040/A-Cognitive-Radio-Network-Architecture-with-Primary-and-Secondary-User-Networks_Q320.jpg)
A Cognitive Radio Network Architecture with Primary and Secondary User... | Download Scientific Diagram
![Sensors | Free Full-Text | Interference Spreading through Random Subcarrier Allocation Technique and Its Error Rate Performance in Cognitive Radio Networks Sensors | Free Full-Text | Interference Spreading through Random Subcarrier Allocation Technique and Its Error Rate Performance in Cognitive Radio Networks](https://www.mdpi.com/sensors/sensors-20-05700/article_deploy/html/images/sensors-20-05700-g002.png)
Sensors | Free Full-Text | Interference Spreading through Random Subcarrier Allocation Technique and Its Error Rate Performance in Cognitive Radio Networks
![Optimized secondary user selection for quality of service enhancement of Two-Tier multi-user Cognitive Radio Network: A game theoretic approach - ScienceDirect Optimized secondary user selection for quality of service enhancement of Two-Tier multi-user Cognitive Radio Network: A game theoretic approach - ScienceDirect](https://ars.els-cdn.com/content/image/1-s2.0-S1389128617301949-gr1.jpg)
Optimized secondary user selection for quality of service enhancement of Two-Tier multi-user Cognitive Radio Network: A game theoretic approach - ScienceDirect
![Performance Evaluation of Cognitive Radio Networks with Imperfect Spectrum Sensing and Bursty Primary User Traffic Performance Evaluation of Cognitive Radio Networks with Imperfect Spectrum Sensing and Bursty Primary User Traffic](https://static.hindawi.com/articles/mpe/volume-2020/4102046/figures/4102046.fig.001.jpg)
Performance Evaluation of Cognitive Radio Networks with Imperfect Spectrum Sensing and Bursty Primary User Traffic
![Figure 1 from Energy-Infeasibility Tradeoff in Cognitive Radio Networks: Price-Driven Spectrum Access Algorithms | Semantic Scholar Figure 1 from Energy-Infeasibility Tradeoff in Cognitive Radio Networks: Price-Driven Spectrum Access Algorithms | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/13a4d22f33debad386654e420a5af2dad7d255b8/1-Figure1-1.png)
Figure 1 from Energy-Infeasibility Tradeoff in Cognitive Radio Networks: Price-Driven Spectrum Access Algorithms | Semantic Scholar
![a) Overview of a cognitive radio system: secondary users may reuse the... | Download Scientific Diagram a) Overview of a cognitive radio system: secondary users may reuse the... | Download Scientific Diagram](https://www.researchgate.net/publication/316856885/figure/fig1/AS:633696461795330@1528096418891/a-Overview-of-a-cognitive-radio-system-secondary-users-may-reuse-the-same-frequency.png)