Author of the publication

The impact of user mobility into non-orthogonal multiple access (NOMA) transmission systems.

, , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 7 (24): e5 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzziness measure on complete hedge algebras and quantifying semantics of terms in linear hedge algebras., and . Fuzzy Sets Syst., 158 (4): 452-471 (2007)Enhancing Physical Layer Security for Cooperative Non-Orthogonal Multiple Access Networks with Artificial Noise., , , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 6 (20): e4 (2019)The impact of user mobility into non-orthogonal multiple access (NOMA) transmission systems., , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 7 (24): e5 (2020)Building the Shortest Path Database in Urban Traffic Network Using RAO Algorithm., , and . MSPN, volume 14482 of Lecture Notes in Computer Science, page 52-70. Springer, (2023)Secure Communication for RF Energy Harvesting NOMA Relaying Networks with Relay-User Selection Scheme and Optimization., , , , and . Mob. Networks Appl., 27 (4): 1719-1733 (2022)An Optimized Bit-Slice Implementation of Secure 8-Bit Sbox Based on Butterfly Structure., , , and . KSE, page 1-6. IEEE, (2023)Building 8×8 Effective Block Circulant MDS Matrices by Utilizing Hadamard Matrices and Circulant Matrices., , , , and . KSE, page 1-6. IEEE, (2023)The interpretability and scalability of linguistic-rule-based systems for solving regression problems., , , , and . Int. J. Approx. Reason., (2022)A High-Throughput Hardware Implementation of NAT Traversal For IPSEC VPN., , and . Int. J. Commun. Networks Inf. Secur., (April 2022)Physical Layer Secrecy Enhancement for Non-orthogonal Multiple Access Cooperative Network with Artificial Noise., and . INISCOM, volume 293 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 81-98. Springer, (2019)