Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Handling Insider Threat Through Supervised Machine Learning Techniques., , , and . EUSPN/ICTH, volume 177 of Procedia Computer Science, page 64-71. Elsevier, (2020)Decentralized Authentication for Secure Cloud Data Sharing., , , and . WETICE, page 95-99. IEEE Computer Society, (2018)Ease or Privacy? A Comprehensive Analysis of Android Embedded Adware., , , and . WETICE, page 254-260. IEEE Computer Society, (2018)Impact of Machine-to-Machine Traffic on LTE Data Traffic Performance., , , , , and . LDIC, page 259-269. Springer, (2014)Novel HARQ schemes for MIMO single-hop and Multi-hop relay systems., and . PIMRC, page 2523-2527. IEEE, (2010)Effect of discrete constellations on duality between the Gaussian Multiple Access and the Gaussian Broadcast Channel., , , and . WTS, page 1-6. IEEE, (2014)Large scaled multi-user MIMO system so called massive MIMO systems for future wireless communication networks., , , , , and . ICAC, page 1-4. IEEE, (2013)Eigenspace structure of a max-drast fuzzy matrix., , and . Fuzzy Sets Syst., (2014)Resource allocation for energy efficiency optimization in uplink-downlink decoupled 5G heterogeneous networks., , , , , , and . Int. J. Commun. Syst., (2021)On Hartley Image rejection receivers and adaptive sinusoidal interference cancellation in automotive wireless links., , , and . ITSC, page 508-513. IEEE, (2014)