[1]
|
Optimization of Speed and Network Deployment for Reliable V2I Communication in the Presence of Handoffs and Interference
IEEE Wireless Communications Letters,
2023
DOI:10.1109/LWC.2023.3259719
|
|
|
[2]
|
Performance of Multidevice Downlink Cell-Free System Under Finite Blocklength for uRLLC With Hard Deadlines
IEEE Journal on Selected Areas in Communications,
2023
DOI:10.1109/JSAC.2023.3280962
|
|
|
[3]
|
A game theoretic model of the behavioural gaming that takes place at the EMS - ED interface
European Journal of Operational Research,
2023
DOI:10.1016/j.ejor.2022.07.001
|
|
|
[4]
|
Does D2D Communication Always Benefit Physical-Layer Security?
IEEE Internet of Things Journal,
2023
DOI:10.1109/JIOT.2022.3202114
|
|
|
[5]
|
A game theoretic model of the behavioural gaming that takes place at the EMS - ED interface
European Journal of Operational Research,
2023
DOI:10.1016/j.ejor.2022.07.001
|
|
|
[6]
|
A game theoretic model of the behavioural gaming that takes place at the EMS - ED interface
European Journal of Operational Research,
2023
DOI:10.1016/j.ejor.2022.07.001
|
|
|
[7]
|
On Detecting Route Hijacking Attack in Opportunistic Mobile Networks
IEEE Transactions on Dependable and Secure Computing,
2023
DOI:10.1109/TDSC.2022.3186029
|
|
|
[8]
|
A game theoretic model of the behavioural gaming that takes place at the EMS - ED interface
European Journal of Operational Research,
2023
DOI:10.1016/j.ejor.2022.07.001
|
|
|
[9]
|
Does D2D Communication Always Benefit Physical-Layer Security?
IEEE Internet of Things Journal,
2023
DOI:10.1109/JIOT.2022.3202114
|
|
|
[10]
|
On Detecting Route Hijacking Attack in Opportunistic Mobile Networks
IEEE Transactions on Dependable and Secure Computing,
2022
DOI:10.1109/TDSC.2022.3186029
|
|
|
[11]
|
A game theoretic model of the behavioural gaming that takes place at the EMS - ED interface
European Journal of Operational Research,
2022
DOI:10.1016/j.ejor.2022.07.001
|
|
|
[12]
|
Extraction and assessment of COVID19 infection in lung CT images using VGG-UNet
Journal of Physics: Conference Series,
2022
DOI:10.1088/1742-6596/2318/1/012048
|
|
|
[13]
|
Automatic detection of ischemic-stroke-lesion with CNN segmentation: a study
Journal of Physics: Conference Series,
2022
DOI:10.1088/1742-6596/2318/1/012049
|
|
|
[14]
|
Automatic classification of histology images into normal/cancer class with pre-trained CNN
Journal of Physics: Conference Series,
2022
DOI:10.1088/1742-6596/2318/1/012046
|
|
|
[15]
|
Detection of Pneumonia in Chest X-Ray with Bat-Algorithm Selected Deep and Handcrafted Features
Journal of Physics: Conference Series,
2022
DOI:10.1088/1742-6596/2318/1/012047
|
|
|
[16]
|
On the Levy measure property of gamma distribution
PROCEEDINGS OF THE 5TH INTERNATIONAL SYMPOSIUM ON CURRENT PROGRESS IN MATHEMATICS AND SCIENCES (ISCPMS2019),
2020
DOI:10.1063/5.0007842
|
|
|
[17]
|
Exponential and Hypoexponential Distributions: Some Characterizations
Mathematics,
2020
DOI:10.3390/math8122207
|
|
|
[18]
|
LIF Neuron with Hypo-exponential Distributed Delay: Emergence of Unimodal, Bimodal, Multimodal ISI Distribution with Long Tail
Recent Patents on Engineering,
2020
DOI:10.2174/1872212113666190315165139
|
|
|
[19]
|
Exponential and Hypoexponential Distributions: Some Characterizations
Mathematics,
2020
DOI:10.3390/math8122207
|
|
|
[20]
|
On the Outage Probability and Power Control of D2D Underlaying NOMA UAV-Assisted Networks
IEEE Access,
2019
DOI:10.1109/ACCESS.2019.2894390
|
|
|
[21]
|
CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic Networks
2019 IEEE Conference on Communications and Network Security (CNS),
2019
DOI:10.1109/CNS.2019.8802699
|
|
|
[22]
|
Stochastic model for crop water stress during agricultural droughts
Engineering Reports,
2019
DOI:10.1002/eng2.12081
|
|
|
[23]
|
Distributed Computer and Communication Networks
Lecture Notes in Computer Science,
2019
DOI:10.1007/978-3-030-36614-8_20
|
|
|
[24]
|
Channel Hardening and Favorable Propagation in Cell-Free Massive MIMO With Stochastic Geometry
IEEE Transactions on Communications,
2018
DOI:10.1109/TCOMM.2018.2846272
|
|
|
[25]
|
Control of Cognitive Networks With Friendly Jamming as a Service
IEEE Transactions on Cognitive Communications and Networking,
2018
DOI:10.1109/TCCN.2018.2799221
|
|
|
[26]
|
Linear Combination of Independent Exponential Random Variables
Methodology and Computing in Applied Probability,
2018
DOI:10.1007/s11009-018-9653-0
|
|
|
[27]
|
On the Class of Infinitely Divisible Exponential Distribution
Journal of Physics: Conference Series,
2018
DOI:10.1088/1742-6596/1097/1/012084
|
|
|
[28]
|
Blockbuster or Niche? Competitive Strategy Under Network Effects
SSRN Electronic Journal ,
2017
DOI:10.2139/ssrn.3049370
|
|
|
[29]
|
Dynamic interference-limited relay sharing in cognitive radio networks by using hierarchical modulation
IET Communications,
2017
DOI:10.1049/iet-com.2016.0816
|
|
|
[30]
|
Blockbuster or Niche? Competitive Strategy Under Network Effects
SSRN Electronic Journal ,
2017
DOI:10.2139/ssrn.3049370
|
|
|
[31]
|
Finding the PDF of the hypoexponential random variable using the Kad matrix similar to the general Vandermonde matrix
Communications in Statistics - Theory and Methods,
2016
DOI:10.1080/03610926.2014.930910
|
|
|
[32]
|
The uniform continuity of characteristic function from convoluted exponential distribution with stabilizer constant
2016
DOI:10.1063/1.4940863
|
|
|
[33]
|
Numerical Methods for Reliability and Safety Assessment
2015
DOI:10.1007/978-3-319-07167-1_23
|
|
|
[34]
|
Numerical Methods for Reliability and Safety Assessment
2015
DOI:10.1007/978-3-319-07167-1_23
|
|
|
[35]
|
Cognitive relay-sharing by using hierarchical modulation under interference constraints
2014 IEEE Global Communications Conference,
2014
DOI:10.1109/GLOCOM.2014.7036935
|
|
|