Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interference-aware radio resource allocation techniques for OFDMA-based wireless networks., , and . WCNIS, page 546-550. IEEE, (2010)FPGA Hardware Implementation of DOA Estimation Algorithm Employing LU Decomposition., , , , , and . IEEE Access, (2018)Anomaly Detection Based on LRD Behavior Analysis of Decomposed Control and Data Planes Network Traffic Using SOSS and FARIMA Models., , , and . IEEE Access, (2017)Improved Support Vector Regression Coupled with Fourier Self-Deconvolution in the Quantitative Analysis of Glucose in NIR Spectra., , , and . IISA, page 1-6. IEEE Computer Society, (2018)A robust anomaly detection method using a constant false alarm rate approach., , , , , , , and . Multim. Tools Appl., 79 (17-18): 12727-12750 (2020)On the Performance of Mobile WiMAX System: Measurement and Propagation Studies., , and . Int. J. Commun. Netw. Syst. Sci., 3 (11): 863-869 (2010)Coupling Scatter Correction with bandpass filtering for preprocessing in the quantitative analysis of glucose from near infrared spectra., , , and . EMBC, page 1800-1803. IEEE, (2017)Analysis of P2P, IRC and HTTP traffic for botnets detection., , , and . Peer-to-Peer Netw. Appl., 11 (5): 848-861 (2018)Throughput-aware Adaptive Water-filling Algorithm for OFDMA-based Networks., and . VTC Fall, IEEE, (2009)Hybrid ARQ schemes for DS spread spectrum systems in the presence of narrow-band interference., and . Int. J. Commun. Syst., 15 (4): 309-324 (2002)