Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure communications via sending artificial noise by both transmitter and receiver: optimum power allocation to minimise the insecure region., , , , and . IET Commun., 8 (16): 2858-2862 (2014)Gamification-Based Apps for PTSD: An Analysis of Functionality and Characteristics., , , and . AICCSA, page 1-6. IEEE Computer Society, (2019)Mobile Apps for Post Traumatic Stress Disorder., , , and . EMBC, page 4279-4282. IEEE, (2019)A Joint TOA/AOA Constrained Minimization Method for Locating Wireless devices in Non-Line-of-Sight Environment., and . VTC Fall, page 496-500. IEEE, (2007)Stochastic geometric analysis of black hole attack on smart grid communication networks., and . SmartGridComm, page 716-721. IEEE, (2012)On the Joint Estimation of the RSS-Based Location and Path-loss Exponent., , and . IEEE Wirel. Commun. Lett., 1 (1): 34-37 (2012)Cooperative beamforming for OFDM-based amplify-and-forward relay networks., , , , and . Phys. Commun., 4 (4): 305-312 (2011)Non-linear least squares estimation for harmonics in multiplicative and additive noise., , and . Signal Process., 78 (1): 43-60 (1999)Harmonic retrieval in the presence of non-circular Gaussian multiplicative noise: performance bounds., , , and . Signal Process., 85 (4): 737-749 (2005)Characterizing physical-layer secrecy with unknown eavesdropper locations and channels., and . ICASSP, page 3432-3435. IEEE, (2011)