Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cooperative communications with relay-selection: when to cooperate and whom to cooperate with?, , , and . IEEE Trans. Wirel. Commun., 7 (7): 2814-2827 (2008)Optimum Resource Allocation for Full-Duplex Vehicular Communication Networks., , and . IEEE Access, (2020)Optimal Angular Spread of the Multipath Clusters in mmWave Systems under Pilot Contamination., , , and . VTC Fall, page 1-6. IEEE, (2017)Enabling Second Factor Authentication for Drones in 5G using Network Slicing., , , , and . GLOBECOM (Workshops), page 1-6. IEEE, (2020)Capacity improvement via indoor small cells., and . IWCMC, page 69-73. IEEE, (2014)A Subspace Signal Processing Technique for Concealed Weapons Detection., , , and . ICASSP (2), page 401-404. IEEE, (2007)Ensemble Regression for 1-Bit Channel Estimation., , and . ICCSPA, page 1-5. IEEE, (2022)Power allocation for device-to-device communication underlaying massive MIMO multicasting networks., , , and . WCNC, page 1219-1224. IEEE, (2015)Three-Dimensional Detection of Pulmonary Nodules in Chest CT Images., , and . Computer and Information Science, 4 (5): 2-13 (2011)Mining Publication Papers via Text Mining: A Case Study., , and . AICV, volume 1153 of Advances in Intelligent Systems and Computing, page 71-80. Springer, (2020)