Author of the publication

Optimizing Multi-Tier Cellular Networks With Deep Learning for 6G Consumer Electronics Communications.

, , , , , , and . IEEE Trans. Consumer Electron., 70 (1): 627-634 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy Efficient Resource Allocation for Uplink MC-NOMA Based Heterogeneous Small Cell Networks With Wireless Backhaul., , , , , and . IEEE Trans. Veh. Technol., 72 (3): 3419-3429 (March 2023)Joint mode selection and user association in D2D enabled multitier C-RAN., , , , , and . Clust. Comput., 25 (4): 2403-2415 (2022)Deep Learning (DL) Based Joint Resource Allocation and RRH Association in 5G-Multi-Tier Networks., , , , and . IEEE Access, (2021)Energy-efficient resource allocation and RRH association in multitier 5G H-CRANs., , and . Trans. Emerg. Telecommun. Technol., (2019)Energy-efficient RRH-association and resource allocation in D2D enabled multi-tier 5G C-RAN., , , , and . Telecommun. Syst., 74 (2): 129-143 (2020)Harnessing technological innovation capabilities by the mediating effect of willingness to share tacit knowledge: a case from Pakistani software SMEs., , , , and . Kybernetes, 52 (12): 6590-6616 (2023)Resource allocation, interference management, and mode selection in device-to-device communication: A survey., and . Trans. Emerg. Telecommun. Technol., (2017)An empirical evaluation of the predictors and consequences of social media health-misinformation seeking behavior during the COVID-19 pandemic., , , , , and . Internet Res., 33 (5): 1871-1906 (2023)A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter., , , , , , and . Secur. Commun. Networks, (2021)TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration., , , , , , and . Sensors, 20 (14): 3945 (2020)