{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:50:31Z","timestamp":1762005031602,"version":"build-2065373602"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Kaikini PhD scholarship in Engineering"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Commun."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/tcomm.2018.2831662","type":"journal-article","created":{"date-parts":[[2018,4,30]],"date-time":"2018-04-30T18:33:07Z","timestamp":1525113187000},"page":"3772-3783","source":"Crossref","is-referenced-by-count":15,"title":["Transmit Antenna Selection for Interference-Outage Constrained Underlay CR"],"prefix":"10.1109","volume":"66","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9708-0913","authenticated-orcid":false,"given":"Rimalapudi","family":"Sarvendranath","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3614-049X","authenticated-orcid":false,"given":"Neelesh B.","family":"Mehta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1049\/ic:20080400"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.011814.130427"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.091911.100633"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2363179"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.122212.120449"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6316788"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2011.6112302"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-016-0370-y"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2009.11.070410"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2419221"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2723885"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2015.2394496"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417618"},{"journal-title":"Tables of Integrals Series and Products","year":"2000","author":"gradshteyn","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2297684"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.080714"},{"journal-title":"Digital Communication Over Fading Channels","year":"2005","author":"simon","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.02.081339"},{"key":"ref8","first-page":"681","article-title":"Symbol error rate analysis in multiuser underlay cognitive radio systems","author":"li","year":"2011","journal-title":"Proc PIMRC"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2043454"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2015717"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.012313.120238"},{"key":"ref1","first-page":"1","article-title":"Optimal transmit antenna selection rule for interference-outage constrained underlay CR","author":"sarvendranath","year":"2017","journal-title":"Proc Globecom"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.907867"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/26.950343"},{"key":"ref21","first-page":"1","article-title":"Exploiting hidden power-feedback loops for cognitive radio","author":"zhang","year":"2008","journal-title":"Proc DySPAN"},{"journal-title":"Handbook of Mathematical Functions with Formulas Graphs and Mathematical Tables","year":"1972","author":"abramowitz","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.111013.130615"},{"journal-title":"Introduction to Algorithms","year":"2009","author":"cormen","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/120869845"}],"container-title":["IEEE Transactions on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/26\/8466051\/08352796.pdf?arnumber=8352796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T11:25:14Z","timestamp":1643196314000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8352796\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":30,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tcomm.2018.2831662","relation":{},"ISSN":["0090-6778","1558-0857"],"issn-type":[{"type":"print","value":"0090-6778"},{"type":"electronic","value":"1558-0857"}],"subject":[],"published":{"date-parts":[[2018,9]]}}}