Author of the publication

Optimisation of throughput of two-way buffer-aided relaying networks with wireless-assisted links.

, and . IET Commun., 11 (10): 1626-1632 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crosstalk avoidance codes for 3D VLSI., and . DATE, page 1673-1678. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Freedom of Privacy: Anonymous Data Collection with Respondent-Defined Privacy Protection., , and . INFORMS J. Comput., 22 (3): 471-481 (2010)Precise static analysis for generic programs in object oriented languages., and . ACM SIGSOFT Softw. Eng. Notes, 37 (3): 1-6 (2012)Triplet geometric representation: a novel scale, translation and rotation invariant feature representation based on geometric constraints for recognition of 2D object features., and . Image Vis. Comput., 15 (3): 235-249 (1997)Multiobjective genetic programming approach to evolving heuristics for the bounded diameter minimum spanning tree problem: MOGP for BDMST., , and . GECCO, page 309-316. ACM, (2009)Improved Encoding of Wavelet Coefficients Extracted From Multispectral and Hyperspectral Image Data., and . ICVGIP, Allied Publishers Private Limited, (2002)An Information Theoretic Image Steganalysis for LSB Steganography., and . Acta Cybern., 24 (4): 593-612 (2020)Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS., , , and . IEEE Access, (2019)Usable-Security Assessment of Healthcare Software System Through Fuzzy ANP-TOPSIS Method., , , , , , and . Int. J. Syst. Dyn. Appl., 10 (4): 1-24 (October 2021)A flexible contention resolution scheme for QoS provisioning in optical burst switching networks., and . Comput. Commun., 29 (12): 2361-2376 (2006)