Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Centralized and distributed spectrum channel assignment in cognitive wireless networks: A Harmony Search approach., , , and . Appl. Soft Comput., 12 (2): 921-930 (2012)Joint Turbo Coding and Source-Controlled Modulation of Cycle-Stationary Sources in the Bandwidth-Limited Regime., , , and . MOBILIGHT, volume 45 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 618-625. Springer, (2010)Erratum to "serially-concatenated LDGM codes for correlated sources over Gaussian broadcast channels"., , , and . IEEE Communications Letters, 14 (3): 235 (2010)H.264/SVC rate-resiliency tradeoff in faulty communications through 802.16e railway networks., , , and . ICUMT, page 1-6. IEEE, (2009)Iterative concatenated Zigzag decoding and blind data fusion of correlated sensors., , and . ICUMT, page 1-6. IEEE, (2009)Design and implementation of a direct RF-to-digital UHF-TV multichannel transceiver., , , and . ISCAS, page 3925-3928. IEEE, (2010)Fuzzy-Logic Based Framework for Spectrum Availability Assessment in Cognitive Radio Systems., , , and . IEEE J. Sel. Areas Commun., 31 (11): 2173-2184 (2013)Deep Echo State Networks for Short-Term Traffic Forecasting: Performance Comparison and Statistical Assessment., , , , , , , and . CoRR, (2020)Data fusion and machine learning for industrial prognosis: Trends and perspectives towards Industry 4.0., , , and . Inf. Fusion, (2019)A novel machine learning approach to the detection of identity theft in social networks based on emulated attack instances and support vector machines., , , , and . Concurr. Comput. Pract. Exp., 28 (4): 1385-1395 (2016)