Author of the publication

On achieving network throughput demand in cognitive radio-based home area networks.

, , , and . EURASIP J. Wireless Comm. and Networking, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Seizure detection by means of Hidden Markov Model and Stationary Wavelet Transform of electroencephalograph signals., , and . BHI, page 62-65. IEEE, (2012)Comparative Performance of Hybrid SCM SAC-OCDMA System Using Complementary and AND Subtraction Detection Techniques., , , , , and . Int. Arab J. Inf. Technol., 5 (1): 61-65 (2008)Micro-crack detection of multicrystalline solar cells featuring an improved anisotropic diffusion filter and image segmentation technique., and . EURASIP J. Image Video Process., (2014)On achieving network throughput demand in cognitive radio-based home area networks., , , and . EURASIP J. Wireless Comm. and Networking, (2015)Using Unified Modeling Language for Conceptual Modelling of Knowledge-Based Systems, , , and . Conceptual Modeling - ER 2007, (2008)Improved View Frustum Culling Technique for Real-Time Virtual Heritage Application., , and . IJVR, 7 (3): 43-48 (2008)Speeding up the ESG Algorithm., and . FLAIRS Conference, page 270-276. AAAI Press, (2005)An overview of attacks against digital watermarking and their respective countermeasures., , , and . CyberSec, page 265-270. IEEE, (2012)VoIP evidence model: A new forensic method for investigating VoIP malicious attacks., , and . CyberSec, page 201-206. IEEE, (2012)Ultra-Wideband Interference Mitigation Using Cross-layer Cognitive Radio., , , and . Wireless Information Systems, page 76-85. INSTICC Press, (2006)