Author of the publication

Peak-to-Average Power Ratio Analysis for OFDM-Based Mixed-Numerology Transmissions.

, , , , , and . IEEE Trans. Vehicular Technology, 69 (2): 1802-1812 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Energy-Efficient Broadcast Protocol in MANETs: Design and Evaluation., , , and . CNSR, page 199-206. IEEE Computer Society, (2010)Frequency Measurement of the Automatic Generator Quasi-synchronizer Based on PIC16F877 and FPGA., , and . PACCS, page 220-223. IEEE Computer Society, (2009)Enable Privacy Preservation and Result Verification for Top-k Query in Two-Tiered Sensor Networks., , , , , and . TrustCom/BigDataSE/ISPA (1), page 555-562. IEEE, (2015)Mechanistic investigation inspired ön water" reaction for hydrobromic acid-catalyzed Friedel-Crafts-type reaction of β-naphthol and formaldehyde., , , , , and . Journal of Computational Chemistry, 38 (26): 2268-2275 (2017)Mixed Numerologies Interference Analysis and Inter-Numerology Interference Cancellation for Windowed OFDM Systems., , , , , and . IEEE Trans. Vehicular Technology, 67 (8): 7047-7061 (2018)Predicting Student Examinee Rate in Massive Open Online Courses., , , , , , and . DASFAA Workshops, volume 10179 of Lecture Notes in Computer Science, page 340-351. Springer, (2017)A Real-Time Suspicious Stay Detection System Based on Face Detection and Tracking in Monitor Videos., , and . ISCID (1), page 264-267. IEEE, (2017)Sybil Detection in Social-Activity Networks: Modeling, Algorithms and Evaluations., , and . ICNP, page 44-54. IEEE Computer Society, (2018)SET: Secure and Efficient Top-k Query in Two-Tiered Wireless Sensor Networks., , , , and . APWeb/WAIM (1), volume 10366 of Lecture Notes in Computer Science, page 495-510. Springer, (2017)Design of a Trust Model and Finding Key-Nodes in Rumor Spreading Based on Monte-Carlo Method., , , and . MASS, page 790-795. IEEE Computer Society, (2009)