From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Handling Insider Threat Through Supervised Machine Learning Techniques., , , и . EUSPN/ICTH, том 177 из Procedia Computer Science, стр. 64-71. Elsevier, (2020)Decentralized Authentication for Secure Cloud Data Sharing., , , и . WETICE, стр. 95-99. IEEE Computer Society, (2018)Ease or Privacy? A Comprehensive Analysis of Android Embedded Adware., , , и . WETICE, стр. 254-260. IEEE Computer Society, (2018)Impact of Machine-to-Machine Traffic on LTE Data Traffic Performance., , , , , и . LDIC, стр. 259-269. Springer, (2014)Novel HARQ schemes for MIMO single-hop and Multi-hop relay systems., и . PIMRC, стр. 2523-2527. IEEE, (2010)Effect of discrete constellations on duality between the Gaussian Multiple Access and the Gaussian Broadcast Channel., , , и . WTS, стр. 1-6. IEEE, (2014)Large scaled multi-user MIMO system so called massive MIMO systems for future wireless communication networks., , , , , и . ICAC, стр. 1-4. IEEE, (2013)Eigenspace structure of a max-drast fuzzy matrix., , и . Fuzzy Sets Syst., (2014)Resource allocation for energy efficiency optimization in uplink-downlink decoupled 5G heterogeneous networks., , , , , , и . Int. J. Commun. Syst., (2021)On Hartley Image rejection receivers and adaptive sinusoidal interference cancellation in automotive wireless links., , , и . ITSC, стр. 508-513. IEEE, (2014)