Author of the publication

Automatic Modulation Classification of Overlapped Sources Using Multi-Gene Genetic Programming With Structural Risk Minimization Principle.

, , , , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Sequential Phase Difference Detection Method for Spectrum Sensing., , , , and . CrownCom, volume 172 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 273-283. Springer, (2016)TOA Based Localization Under NLOS in Cognitive Radio Network., , , , , and . CrownCom, volume 172 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 668-679. Springer, (2016)A Novel Lifecycle Framework for Semantic Web Service Annotation Assessment and Optimization., , , , , and . ICWS, page 361-368. IEEE Computer Society, (2015)Automated Composition of Semantic Web Services Using Case-Based Planning., and . IFITA (3), page 246-251. IEEE Computer Society, (2009)Cognitive information delivery in geo-location database based cognitive radio networks., , , , , and . Wireless Communications and Mobile Computing, 16 (13): 1876-1890 (2016)Classification Based Parameter Association for Non-redundant Annotation., , , and . SCC, page 688-695. IEEE Computer Society, (2015)The achievable capacity scaling laws of 3D cognitive radio networks., , , , , and . ICC, page 1-6. IEEE, (2016)An Optimal Service Strategy for Grouped Machine-Type Communications in Cellular Networks., , , and . IEEE Communications Letters, 21 (1): 140-143 (2017)Energy-Efficient Layered Video Multicast over OFDM-Based Cognitive Radio Systems., , , , and . IJDSN, (2015)Inferring Patterns for Taint-Style Vulnerabilities With Security Patches., , , and . IEEE Access, (2019)