Author of the publication

5G D2D Transmission Mode Selection Performance & Cluster Limits Evaluation of Distributed Artificial Intelligence and Machine Learning Techniques.

, , , and . CoRR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Received signal strength for randomly distributed molecular nanonodes., , , , and . NANOCOM, page 1:1-1:6. ACM, (2017)Selection of UE-based Virtual Small Cell Base Stations using Affinity Propagation Clustering., , , , and . IWCMC, page 1104-1109. IEEE, (2018)On the efficient use of multiple channels by single-receiver clients in wireless data broadcasting., , , , and . Int. J. Commun. Syst., 27 (3): 513-520 (2014)A novel communication paradigm for high capacity and security via programmable indoor wireless environments in next generation wireless systems., , , , , and . Ad Hoc Networks, (2019)3D Channel Modeling and Characterization for Hypersurface Empowered Indoor Environment at 60 GHz Millimeter-Wave Band., , , , , , and . SPECTS, page 1-6. IEEE, (2019)An Interpretable Neural Network for Configuring Programmable Wireless Environments., , , , , and . SPAWC, page 1-5. IEEE, (2019)Advanced Physical-layer Security as an App in Programmable Wireless Environments., , , , , , and . SPAWC, page 1-5. IEEE, (2020)On the Network-Layer Modeling and Configuration of Programmable Wireless Environments., , , , , and . IEEE/ACM Trans. Netw., 27 (4): 1696-1713 (2019)Key issues for the design and development of mobile commerce services and applications., , , , , , and . Int. J. Mob. Commun., 3 (3): 303-323 (2005)A security protocol for D2D communications in 5G networks using elliptic curve cryptography., , , , , , , , and . Int. J. Inf. Sec., 21 (6): 1389-1408 (2022)