Author of the publication

A novel joint optimization of downlink transmission using physical layer security in cooperative 5G wireless networks.

, , , , , , , and . IJDSN, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructing Fuzzy Ontology by Using Method of Concept Distance Clustering., , , and . HPCC/EUC, page 1269-1273. IEEE, (2013)Analysis of user's behavior and resource characteristics for private trackers., , , and . Peer-to-Peer Networking and Applications, 8 (3): 432-446 (2015)Some applications of Loop-subdivision wavelet tight frames to the processing of 3D graphics., , and . The Visual Computer, 27 (1): 35-43 (2011)Design and implementation of communication system of the Dawning 6000 supercomputer., , , and . Frontiers of Computer Science in China, 4 (4): 466-474 (2010)Breakout prediction for continuous casting using genetic algorithm-based back propagation neural network model., , , , , and . IJMIC, 16 (3): 199-205 (2012)Exploring Flow Characteristics in IPv6: A Comparative Measurement Study with IPv4 for Traffic Monitoring., , , and . TIIS, 8 (4): 1307-1323 (2014)Minimum Deadlock-Free Message Routing Restrictions in Binary Hypercubes.. J. Parallel Distrib. Comput., 15 (2): 153-159 (1992)High-Efficiency Differential RF Front-End for a Gen2 RFID Tag., , , , , , and . IEEE Trans. on Circuits and Systems, 58-II (4): 189-194 (2011)Developing operation layer of logistics information system based on EPCIS., , and . IJES, 7 (2): 115-122 (2015)Bit-level two's complement matrix multiplication., , and . Integration, 33 (1-2): 3-21 (2002)