Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Beamforming in Full-Duplex SWIPT Systems., , , , , and . CoRR, (2017)To Sense or Not To Sense. CoRR, (2012)Evolutionary techniques versus swarm intelligences: application in reservoir release optimization., and . Neural Comput. Appl., 24 (7-8): 1583-1594 (2014)Throughput of a cooperative energy harvesting secondary user in cognitive radio networks., and . Trans. Emerg. Telecommun. Technol., 27 (10): 1365-1379 (2016)Optimizing neuro-fuzzy modules for data fusion of vehicular navigation systems using temporal cross-validation., , and . Eng. Appl. Artif. Intell., 20 (1): 49-61 (2007)Securing OFDM-Based NOMA SWIPT Systems., and . IEEE Trans. Veh. Technol., 69 (10): 12343-12347 (2020)RBF-NN-based model for prediction of weld bead geometry in Shielded Metal Arc Welding (SMAW)., , , and . Neural Comput. Appl., 29 (3): 889-899 (2018)Cyclostationary Noise Modeling Based on Frequency-Shift Filtering in NB-PLC., , , , and . GLOBECOM, page 1-6. IEEE, (2016)Probabilistic Jamming/Eavesdropping Attacks to Confuse a Buffer-Aided Transmitter-Receiver Pair., , , and . IEEE Communications Letters, 21 (7): 1549-1552 (2017)Accuracy Enhancement of Inertial Sensors Utilizing High Resolution Spectral Analysis., , , , , , and . Sensors, 12 (9): 11638-11660 (2012)