Author of the publication

Interference Mitigation for Multicast D2D Communications Underlay Cellular Networks.

, , and . ICAIIC, page 1-4. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Encryption-then-Compression System for Cloud-based Medical Image Services., and . ICOIN, page 30-33. IEEE, (2022)LoRa Mesh Network for Smart Metering in Rural Electrification., , , , , and . SMA, page 319-324. ACM, (2020)Performance characterization of CSMA/CA adapted multi-user MIMO aware MAC in WLANs., , and . EURASIP J. Wireless Comm. and Networking, (2011)An efficient image-based verification scheme by fusion of double random phase encoding and dynamic chaotic map., , , and . Multimedia Tools Appl., 78 (17): 25001-25018 (2019)Characterizing hidden nodes with experimental evaluation in noisy MANETs., , , and . ICC, page 1763-1768. IEEE, (2013)Comprehensive Performance Analysis of Privacy Protection Protocols Utilizing Fake Packet Injection Techniques., and . IEEE Access, (2020)Precise-Optimal Frame Length Based Collision Reduction Schemes for Frame Slotted Aloha RFID Systems., and . KSII Trans. Internet Inf. Syst., 8 (1): 165-182 (2014)Deep Learning in Physical Layer: Review on Data Driven End-to-End Communication Systems and their Enabling Semantic Applications., and . CoRR, (2024)Survey on MAC protocols in Underwater Acoustic Sensor Networks., and . ISCIT, page 80-84. IEEE, (2014)Optimum Tag Reading Efficiency of Multi-Packet Reception Capable RFID Readers., , and . CoRR, (2013)