Author of the publication

Common Throughput Maximization in Wireless Powered Communication Networks With Non-Orthogonal Multiple Access.

, , , , and . IEEE Trans. Veh. Technol., 69 (7): 7692-7706 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A local-world network model based on inter-node correlation degree, , and . Physica A: Statistical Mechanics and its Applications, 378 (2): 561--572 (May 15, 2007)Computing with words for discrete general type-2 fuzzy sets based on α plane., , and . ICVES, page 268-272. IEEE, (2013)Multiscale entropy based analysis of HRV during sleep., , , , and . BMEI, page 558-562. IEEE, (2012)Inverse Matroid Intersection Problem., and . Math. Methods Oper. Res., 45 (2): 235-243 (1997)Distributed Consensus Based Supply-Demand Balance Algorithm for Economic Dispatch Problem in a Smart Grid With Switching Graph., , and . IEEE Trans. Ind. Electron., 64 (2): 1600-1610 (2017)A Set-Theoretic Study of the Relationships of Image Models and Priors for Restoration Problems., , , and . CoRR, (2020)无线纳米传感器网络高吞吐量无冲突接入控制 (High-throughput and Collision-free Medium Access Control for Wireless Nanosensor Networks)., , and . 计算机科学, 42 (Z11): 273-276 (2015)Training neural networks by marginalizing out hidden layer noise., and . Neural Comput. Appl., 29 (9): 401-412 (2018)Integral Attacks on Reduced-Round ARIA Block Cipher., , and . ISPEC, volume 6047 of Lecture Notes in Computer Science, page 19-29. Springer, (2010)Cryptanalysis of Reduced-Round KLEIN Block Cipher., , , and . Inscrypt, volume 7537 of Lecture Notes in Computer Science, page 237-250. Springer, (2011)