Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A MIMO cross-layer precoding security communication system., , , , , , , and . CNS, page 500-501. IEEE, (2014)A Novel Reactive Power Control Scheme for CSC Based PMSG Wind Energy System., , and . IAS, page 1-6. IEEE, (2008)A Posteriori Approach for Community Detection., , , , and . J. Comput. Sci. Technol., 26 (5): 792-805 (2011)ILP formulations for p-cycle design without candidate cycle enumeration., , and . IEEE/ACM Trans. Netw., 18 (1): 284-295 (2010)Service-oriented software architecture for flexible manufacturing control system., , and . CASE, page 425-430. IEEE, (2006)An Efficient Fitness Assignment Based on Dominating Tree., , and . ICDM Workshops, page 247-252. IEEE Computer Society, (2007)Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions., , and . IEEE Wireless Commun. Letters, 3 (3): 273-276 (2014)Adaptive Threshold Control for Energy Detection Based Spectrum Sensing in Cognitive Radios., , , , , and . IEEE Wireless Commun. Letters, 1 (5): 448-451 (2012)ILP formulations for non-simple p-cycle and p-trail design in WDM mesh networks., , and . Computer Networks, 54 (5): 716-725 (2010)Analyzing Communication Interaction Networks (CINs) in enterprises and inferring hierarchies., , , and . Computer Networks, 57 (10): 2147-2158 (2013)