Author of the publication

Direct Bit Loading With Reduced Complexity and Overhead for Precoded OFDM Systems.

, , , , , and . IEEE Trans. Vehicular Technology, 68 (7): 7169-7173 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phishing Detection: A Literature Survey., , and . IEEE Commun. Surv. Tutorials, 15 (4): 2091-2121 (2013)Gateway Placement Optimization in Wireless Mesh Networks With QoS Constraints., , , and . IEEE J. Sel. Areas Commun., 24 (11): 2127-2136 (2006)A Power and Spectrum Efficient Uplink Transmission Scheme for QoS-Constrained IoT Networks., , , , and . IEEE Internet Things J., 9 (18): 17425-17439 (2022)An Enhanced Emotion Recognition Algorithm Using Pitch Correlogram, Deep Sparse Matrix Representation and Random Forest Classifier., , , and . IEEE Access, (2021)A Trust and Reputation System for IoT Service Interactions., , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2987-3005 (2022)A State-of-the-Art Review of Cloud Forensics., , and . J. Digit. Forensics Secur. Law, 9 (4): 7-28 (2014)Power Allocation for Reliable SIC Detection of Rectangular QAM-based NOMA Systems., and . IEEE Trans. Veh. Technol., 70 (8): 8355-8360 (2021)Lexical URL analysis for discriminating phishing and legitimate websites., , and . CEAS, page 109-115. ACM, (2011)A study of feature subset evaluators and feature subset searching methods for phishing classification., , and . CEAS, page 135-144. ACM, (2011)An Empirical Evaluation for Feature Selection Methods in Phishing Email Classification., , and . Comput. Syst. Sci. Eng., (2013)