Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Security Risk Assessment Based on Item Response Theory., , , and . EAI Endorsed Trans. Security Safety, 2 (5): e5 (2015)Wireless Energy Harvesting Two-Way Relay Networks with Hardware Impairments., , and . Sensors, 17 (11): 2604 (2017)Cluster-Based Resource Allocation for Spectrum-Sharing Femtocell Networks., , , , , and . IEEE Access, (2016)An Improved Transmission Scheme of TR-SWIPT Technique., , and . Wireless Personal Communications, 111 (4): 2311-2323 (2020)Time-reversal ESD for Direction of Arrival Estimation over Multipath channels., , and . ICCC, page 1319-1323. IEEE, (2020)Fast Searching Algorithm for Vector Quantization Based on Subvector Technique., , , and . IEICE Trans. Inf. Syst., 91-D (7): 2035-2040 (2008)Dynamic channel allocation algorithm based on parameter estimation in cognitive radio., , and . WCSP, page 1-5. IEEE, (2011)D2D通信网络中一种基于时间反演的无线资源优化机制 (Radio Resource Optimization Mechanism Based on Time-reversal in Device-to-Device Communication Network)., , and . 计算机科学, 45 (10): 78-82 (2018)Informed spectrum usage Based on Location-awareness in Cognitive Networks., , and . EAI Endorsed Trans. Cogn. Commun., 2 (6): e4 (2016)Power savings for cell search application with DRX feature in LTE., and . FSKD, page 2953-2956. IEEE, (2012)