Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Beamforming in Full-Duplex SWIPT Systems., , , , , and . CoRR, (2017)Secure Beamforming in Full-Duplex MISO-SWIPT Systems With Multiple Eavesdroppers., , , , , and . IEEE Trans. Wirel. Commun., 17 (10): 6559-6574 (2018)Evolutionary techniques versus swarm intelligences: application in reservoir release optimization., and . Neural Comput. Appl., 24 (7-8): 1583-1594 (2014)Optimizing neuro-fuzzy modules for data fusion of vehicular navigation systems using temporal cross-validation., , and . Eng. Appl. Artif. Intell., 20 (1): 49-61 (2007)Throughput of a cooperative energy harvesting secondary user in cognitive radio networks., and . Trans. Emerg. Telecommun. Technol., 27 (10): 1365-1379 (2016)Securing OFDM-Based NOMA SWIPT Systems., and . IEEE Trans. Veh. Technol., 69 (10): 12343-12347 (2020)RBF-NN-based model for prediction of weld bead geometry in Shielded Metal Arc Welding (SMAW)., , , and . Neural Comput. Appl., 29 (3): 889-899 (2018)Mutual Information of Buffer-Aided Full-Duplex Relay Channels., , , and . CoRR, (2017)To Sense or Not To Sense. CoRR, (2012)Artificial-Noise-Aided Energy-Efficient Secure Beamforming for Multi-Eavesdroppers in Cognitive Radio Networks., , , , , and . IEEE Syst. J., 14 (3): 3801-3812 (2020)