Author of the publication

Joint optimal power allocation and relay location for decode-and-forward multi-hop relaying over log-normal channel.

, and . IET Commun., 9 (18): 2197-2207 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Partner Selection Based on Optimal Power Allocation for Lifetime Maximization in Cooperative Networks., and . IEEE Trans. Vehicular Technology, 66 (4): 3088-3102 (2017)Secrecy outage of cooperative relay network with and without eavesdropper's direct link., , and . NCC, page 1-6. IEEE, (2017)An experimental validation of system level design space exploration methodology for energy efficient sensor nodes., , and . ISLPED, page 355-358. ACM, (2009)Precoding-Aided Secure Time-Domain Index Modulation., and . IEEE Communications Letters, 24 (5): 966-970 (2020)Direction of Arrival Estimation and Beamforming of Multiple Coherent UWB Signals., and . ICC, page 1-5. IEEE, (2010)Channel-based mapping diversity for enhancing the physical layer security in the Internet of Things., , and . PIMRC, page 1-6. IEEE, (2017)Secure Energy Efficiency with Poisson Point Process Distributed Jammers., and . WF-IoT, page 19-23. IEEE, (2019)E-Learning Material Development Framework Supporting 360VR Images/Videos Based on Linked Data for IoT Security Education., , , , , and . EIDWT, volume 29 of Lecture Notes on Data Engineering and Communications Technologies, page 148-160. Springer, (2019)ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems., , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1673-1686 (2022)Optimal Green Hybrid Attacks in Secure IoT., , and . CoRR, (2019)