[1] J.Mitola,G. Q.Maguire, 1999."Cognitive radio: making software radios more personal." IEEE personal communications, 6 13 -18
[2] B.Benmammar,A.Amraoui,F.Krief, 2013."A survey on dynamic spectrum access techniques in cognitive radio networks.",International Journal of Communication Networks and Information Security 5 68 -
[3] IanF.,Akyildiz, 2006."NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey." Computer networks, 50 2127 -2159
[4] G. S.Almasi,A.Gottlieb, 1988."Highly parallel computing", -
[5] A. HLand,A. G.Doig, 1960."An automatic method of solving discrete programming problems.",Econometrica: Journal of the Econometric Society 497 -520
[6] R.Gomory,RAND-P-1885. RAND CORP SANTA MONICACA, 1960.An algorithm for the mixed integer problem, -
[7] R.Bellman, 1956."Dynamic programming and Lagrange multipliers," Proceedings of the National Academy of Sciences 42 767 -769
[8] H. M.Pande, 2008.Design analysis and algorithm,Firewall Media -
[9] D.BMM Fontes,N.Christofides, 2006."A dynamic programming approach for solving singlesource uncapacitated concave minimum cost network flow problems.",European Journal of Operational Research 174 1205 -1219
[10] M.Fonoberova, 2010."Algorithms for finding optimal flows in dynamic networks." Handbook of Power Systems II, 31 -54
[11] M. U.Ilyas,H.Radha, 2012."A dynamic programming approach to maximizing a statistical measure of the lifetime of sensor networks." ACM Transactions on Sensor Networks (TOSN), 8 18 -
[12] H.Liang,Hui , X. H.,Zhao, 2013."Dynamic programming based power control algorithm with primary user QoS guarantee for cognitive radio networks.",Chinese Journal of Electronics 22 353 -358
[13] Q.Wang, 2017."An Improved Dynamic Programming for Power Allocation in Cognitive Radio.",Information Technology and Intelligent Transportation Systems 43 -51
[14] L.Gao,W.Peng,S.Cui, 2007."Power and rate control with dynamic programming for cognitive radios," IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference. IEEE -
[15] S. J.Russell, 2003.Artificial intelligence: a modern approach, 2 -
[16] S.Kirkpatrick,C. D.Gelatt,M. P.Vecchi, 1983."Optimization by simmulated annealing.", 4598 671 -680
[17] F.Glover, 1989."Tabu search-part I." ORSA Journal on computing, 1 190 -206
[18] J. H.Holland, 1992.",Genetic algorithms." Scientific American 267 66 -72
[19] R. C.Eberhart,J.Kennedy, ."A new optimizer using particle swarm theory." Proceedings of the sixth international symposium on micro machine and human science, 1 -
[20] M.Dorigo,V.Maniezzo,A.Colorni,PartB, 1996.Cybernetics)," IEEE Transactions on Systems, Man, and Cybernetics 26 29 -41
[21] X. S.Yang,S.Deb, 2009."Cuckoo search via Lévy flights,NaBIC 2009. World Congress on. IEEE -
[22] X. S.Yang, 2010.Nature-inspired metaheuristic algorithms, -
[23] M.Dhivya,M.Sundarambal, 2011."Cuckoo search for data gathering in wireless sensor networks.",International Journal of Mobile Communications 9 642 -656
[24] J.Cheng, 2016."An Effective Cuckoo Search Algorithm for Node Localization in Wireless Sensor Network.",Sensors 16 1390 -
[25] B.Ramakrishnan,S. R.Sreedivya,M.Selvi, 2015."Adaptive routing protocol based on cuckoo search algorithm (ARP-CS) for secured vehicular ad hoc network (VANET)." International Journal of computer networks and applications (IJCNA), 2 173 -178
[26] A.Amraoui,B.Benmammar,F.Krief,F. T.Bendimerad, 2013.Auction-based Agent Negotiation in Cognitive Radio Ad Hoc Networks,Revised Selected Papers Series: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 111 119 -134
[27] D.Lavrova,A.Pechenkin, 2015."Applying Correlation and Regression Analysis Methods for Security Incidents Detection in the Internet of Things." International journal of communication networks and information security (IJCNIS), 7 131 -137
[28] P.Rawat,K. D.Singh,and J. M.Bonnin, 2016."Cognitive radio for M2M and Internet of Things: A survey." Computer Communications, 94 1 -29
[29] ., -
[30] B. M.Tharik,ESRSAPublications, 2013.4,International Journal of Engineering Research and Technology 2 -