Author of the publication

Analysis and control of the part load vortex rope in the draft tube of a pumpturbine, Cavitation and dynamic problems

, , , and . Cavitation and dynamic problems : proceedings of the 6th IAHR International Meeting of the Workgroup on Cavitation and Dynamic Problems in Hydraulic Machinery and Systems, Novo mesto, Faculty of Technologies and Systems, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Range and DOA Estimation of Near-field Sources via the Fourth-order Statistics., , , and . ISCAS, page 2465-2468. IEEE, (2009)Improving the Physical-Layer Security of Wireless Two-Way Relaying via Analog Network Coding., , and . GLOBECOM, page 1-6. IEEE, (2011)Secrecy outage of a two-user slow fading broadcast channel., , , and . GLOBECOM, page 4108-4113. IEEE, (2014)Blind closed-form DOA estimation for distributed sources., , , and . ISCAS, page 2821-2824. IEEE, (2012)Projection-based power allocation scheme for joint transmission system., , and . WCSP, page 1-5. IEEE, (2011)Enhancing wireless secrecy via cooperation: signal design and optimization., and . IEEE Communications Magazine, 53 (12): 47-53 (2015)A Linear Analog Network Coding for Asynchronous Two-Way Relay Networks., , and . IEEE Trans. Wireless Communications, 9 (12): 3630-3637 (2010)Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems., , and . IEEE Trans. Vehicular Technology, 64 (10): 4893-4898 (2015)Optimization of Postal Distribution Network Based on Rendezvous with Heterogeneous Vehicles and Capacity Constraints., , and . KES, volume 60 of Procedia Computer Science, page 1347-1356. Elsevier, (2015)Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks., , and . IEEE Trans. Information Forensics and Security, 9 (8): 1240-1250 (2014)