default search action
Adnan Ahmed Khan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j10]Humayun Zubair Khan, Mudassar Ali, Imran Rashid, Abdul Ghafoor, Muhammad Naeem, Adnan Ahmed Khan, Adil Masood Saddiqui:
Resource allocation for energy efficiency optimization in uplink-downlink decoupled 5G heterogeneous networks. Int. J. Commun. Syst. 34(14) (2021) - 2020
- [j9]Kiran Khurshid, Muhammad Imran, Adnan Ahmed Khan, Imran Rashid, Muhammad Haroon Siddiqui:
Efficient hybrid Neumann series based MMSE assisted detection for 5G and beyond massive MIMO systems. IET Commun. 14(22): 4142-4151 (2020)
2010 – 2019
- 2019
- [j8]Yawar Abbas Bangash, Tauseef Rana, Haider Abbas, Muhammad Ali Imran, Adnan Ahmed Khan:
Incast Mitigation in a Data Center Storage Cluster Through a Dynamic Fair-Share Buffer Policy. IEEE Access 7: 10718-10733 (2019) - [j7]Muhammad Haroon Siddiqui, Kiran Khurshid, Imran Rashid, Adnan Ahmed Khan, Khubaib Ahmed:
Optimal Massive MIMO Detection for 5G Communication Systems via Hybrid n-Bit Heuristic Assisted-VBLAST. IEEE Access 7: 173646-173656 (2019) - [j6]Ashfaq Ahmed, Mudassar Ali, Muhammad Naeem, Muhammad Iqbal, Udit Pareek, Adnan Ahmed Khan:
A nonorthogonal cooperative scheme for multiuser CRN using probabilistic interference constraint. Trans. Emerg. Telecommun. Technol. 30(5) (2019) - 2018
- [j5]Zakir Ullah, Muhammad Hasan Islam, Adnan Ahmed Khan, Imran Shafi:
MT-SECURER: multi-factors trust for secure and reliable routing in MANETs. Int. J. Ad Hoc Ubiquitous Comput. 28(3): 131-147 (2018) - 2017
- [c10]Zar Khitab, Farooq Ahmed Bhatti, Adnan Ahmed Khan, Adil Masood Siddiqui, Imran Rashid:
New technique: Surface modeling of dual polarized RADARs antenna structure for cross polarization reduction. GCCE 2017: 1-4 - 2016
- [j4]Zakir Ullah, Muhammad Hasan Islam, Adnan Ahmed Khan, Sohail Sarwar:
Filtering Dishonest Trust Recommendations in Trust Management Systems in Mobile Ad Hoc Networks. Int. J. Commun. Networks Inf. Secur. 8(1) (2016) - 2015
- [c9]Adnan Ahmed Khan, Amna Qayyum, Muhammad Ali Imran:
Multiuser Detection of Co-Channel Systems Using Combination of Basic Network Coding and HARQ. VTC Spring 2015: 1-5 - 2014
- [j3]Awais Saeed, Adnan Ahmed Khan, Syed Ismail Shah, Shariq Yasin:
Capacity Dimensioning of HSDPA Urban Network. Int. J. Commun. Networks Inf. Secur. 6(2) (2014) - 2013
- [c8]Noman Akbar, Adnan Ahmed Khan, Faizan Qasim Butt, Muhammad Salman Saleem, Sadia Riffat, Raja Iqbal:
Performance analysis of energy detection spectrum sensing using MIMO-OFDM VBLAST test bed. WMNC 2013: 1-4 - [c7]Ibrahim Khalil, Adnan Ahmed Khan:
Turbo-coded HARQ scheme in multi-hop cooperative wireless networks. WMNC 2013: 1-4 - 2011
- [c6]Ibrahim Khalil, Adnan Ahmed Khan, Zohaib-Ur-Rehman:
Turbo-Coded HARQ with Switchable Relaying Mechanism in Single Hop Cooperative Wireless System. FIT 2011: 253-257 - [c5]Samreen Umer, Adnan Ahmed Khan:
Optimal relay station placement in cooperative networks using particle swarm. GECCO (Companion) 2011: 11-12 - 2010
- [j2]Sajid Bashir, Muhammad Naeem, Adnan Ahmed Khan, Syed Ismail Shah:
An application of univariate marginal distribution algorithm in MIMO communication systems. Int. J. Commun. Syst. 23(1): 109-124 (2010) - [c4]Kiran Khurshid, Safwat Irteza, Adnan Ahmed Khan:
Application of ant colony optimization based algorithm in MIMO detection. IEEE Congress on Evolutionary Computation 2010: 1-7
2000 – 2009
- 2008
- [j1]Adnan Ahmed Khan, Sajid Bashir, Muhammad Naeem, Syed Ismail Shah, Xiaodong Li:
Symbol detection in spatial multiplexing system using particle swarm optimization meta-heuristics. Int. J. Commun. Syst. 21(12): 1239-1257 (2008) - 2007
- [c3]Adnan Ahmed Khan, Muhammad Naeem, Syed Ismail Shah:
A particle swarm algorithm for symbols detection in wideband spatial multiplexing systems. GECCO 2007: 63-69 - [c2]Sajid Bashir, Adnan Ahmed Khan, Muhammad Naeem, Syed Ismail Shah:
An Application of GA for Symbol Detection in MIMO Communication Systems. ICNC (2) 2007: 404-410 - [c1]Adnan Ahmed Khan, Sajid Bashir, Muhammad Naeem, Syed Ismail Shah, Asrar U. H. Sheikh:
Binary Ant Colony Algorithm for Symbol Detection in a Spatial Multiplexing System. UC 2007: 115-126
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint