Author of the publication

Energy-Efficient Resource Scheduling Within DRX Cycles for LTE-A Networks With Carrier Aggregation.

, , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparing Apples and Oranges? On the Evaluation of Methods for Temporal Knowledge Graph Forecasting., , , , and . ECML/PKDD (3), volume 14171 of Lecture Notes in Computer Science, page 533-549. Springer, (2023)Job Allocation schemes for Mobile Service Robots in Hospitals., , and . BIBM, page 1323-1326. IEEE Computer Society, (2018)Microscopic Image Classification Using DCT for the Detection of Acute Lymphoblastic Leukemia (ALL)., , , and . CVIP (1), volume 459 of Advances in Intelligent Systems and Computing, page 171-180. Springer, (2016)Software defined network-based HTTP flooding attack defender., , , and . Comput. Electr. Eng., (2022)High Accuracy WiFi-Based Human Activity Classification System with Time-Frequency Diagram CNN Method for Different Places., , , and . Sensors, 21 (11): 3797 (2021)AED: Adaptive Energy-Efficient Data Transmission Scheme for Heart Disease Detection., , and . DASC/PiCom/DataCom/CyberSciTech, page 312-317. IEEE Computer Society, (2017)Performance Analysis and Adaptive DRX Scheme for Dual Connectivity., , and . IEEE Internet of Things Journal, 6 (6): 10289-10304 (2019)Paley-Wiener criterion in linear canonical transform domains., , and . Signal Image Video Process., 9 (1): 105-106 (2015)Online Distributed User Association for Heterogeneous Radio Access Network., , and . Sensors, 19 (6): 1412 (2019)Anomaly based network intrusion detection for IoT attacks using deep learning technique., , , and . Comput. Electr. Eng., (April 2023)