Author of the publication

Capacity of Optical Wireless Channels in Atmospheric Turbulence with Transmission Power Adaptation based on Fading Reciprocity.

, , , , , and . ICAIT, page 72-77. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning high-quality depth map from 360° multi-exposure imagery., , , and . Multim. Tools Appl., 81 (25): 35965-35980 (2022)Dynamic Load Balancing Algorithm Based on Per-pixel Rendering Cost Estimation for Parallel Ray Tracing on PC Clusters., , , and . IGTA, volume 1043 of Communications in Computer and Information Science, page 591-601. Springer, (2019)Chinese Character Recognition Method Based on Multi-features and Parallel Neural Network Computation., , , , and . ICIC (1), volume 4681 of Lecture Notes in Computer Science, page 1103-1111. Springer, (2007)A Secure Virtual Machine Allocation Strategy Against Co-Resident Attacks., , , , , , , and . J. Adv. Comput. Intell. Intell. Informatics, 23 (5): 898-908 (2019)PCformer: A parallel convolutional transformer network for 360° depth estimation., , , and . IET Comput. Vis., 17 (2): 156-169 (March 2023)A Method for Detecting Femur Fracture Based on SK-DenseNet., , , , , , , , and . AIAM (ACM), page 71:1-71:7. ACM, (2019)Security Strategy for Virtual Machine Allocation in Cloud Computing., , , , , , and . IIKI, volume 147 of Procedia Computer Science, page 140-144. Elsevier, (2018)Computer-aided diagnosis of mammographic masses using geometric verification-based image retrieval., , , , , , , and . Medical Imaging: Computer-Aided Diagnosis, volume 10134 of SPIE Proceedings, page 101342W. SPIE, (2017)Correlation Analysis of Internet Addiction with Daily Behavior: A Data-Driven Method., , , , and . ICBDT, page 41-46. ACM, (2020)NADSR: A Network Anomaly Detection Scheme Based on Representation., , , , , , , and . KSEM (1), volume 12274 of Lecture Notes in Computer Science, page 380-387. Springer, (2020)