Author of the publication

Application of a leakage based precoding scheme to mitigate intrinsic interference in FBMC.

, , and . ICC, page 5268-5272. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning Based Trust Computational Model for IoT Services., , , and . IEEE Trans. Sustain. Comput., 4 (1): 39-52 (2019)Ensuring Academic Integrity of Online Examinations., , , , and . ICIIS, page 295-300. IEEE, (2021)RpR: A Trust Computation Model for Social Internet of Things., , , and . UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld, page 930-937. IEEE Computer Society, (2016)CNN for Facial Emotion Recognition in Online Learning Platforms to Identify Learner Engagement., , and . ICIIS, page 128-133. IEEE, (2023)Trust-Based Data Controller for Personal Information Management., , and . IIT, page 123-128. IEEE, (2018)Machine Learning based Atmospheric Duct Interference Evaluation in TD-LTE Networks., , and . ICIIS, page 377-382. IEEE, (2023)Security Vulnerabilities of the Cisco IOS Implementation of the MPLS Transport Profile., , , , and . SEGS@CCS, page 45-50. ACM, (2014)TrustChain: A Privacy Preserving Blockchain with Edge Computing., , , and . Wirel. Commun. Mob. Comput., (2019)Trust evaluation in the IoT environment.. Liverpool John Moores University, UK, (2018)British Library, EThOS.Machine Learning Based Zero Trust Architecture for Secure Networking., , , , and . ICIIS, page 1-6. IEEE, (2023)