Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Allied Power Constraint Optimization and Optimal Beam Tracking Schemes for Mobile mmWave Massive MIMO Communications., , , , , and . IEEE Access, (2021)A Novel Transceiver and an Asynchronous Mode for the Hybrid Multiple-Access HetNet Architecture., , , , , , and . IEEE Access, (2023)AI-Based Epileptic Seizure Detection and Prediction in Internet of Healthcare Things: A Systematic Review., , , , , , and . IEEE Access, (2023)A Deep Contextual Bandit-Based End-to-End Slice Provisioning Approach for Efficient Allocation of 5G Network Resources., , and . Network, 2 (3): 370-388 (2022)Predicting Trends and Research Patterns of Smart Cities: A Semi-Automatic Review Using Latent Dirichlet Allocation (LDA)., , , , , and . IEEE Access, (2022)A new video interpolation technique based on motion-adaptive subsampling., , and . IEEE Trans. Consumer Electronics, 45 (3): 782-787 (1999)An Eccentricity Based Data Routing Protocol with Uniform Node Distribution in 3D WSN., , and . Sensors, 17 (9): 2137 (2017)A Design of Presentation System for Interactive Multimedia Contents Based on Event-Driven Processing Model., , , , , , and . Human.Society@Internet, volume 3597 of Lecture Notes in Computer Science, page 357-360. Springer, (2005)Polarization-based cooperative directional MAC protocol for ad hoc networks., , , and . Ad Hoc Networks, 11 (4): 1522-1538 (2013)Blockchain-Based Transaction Validation Protocol for a Secure Distributed IoT Network., , , , , , and . IEEE Access, (2020)