default search action
Javad Musevi Niya
Person information
- affiliation: University of Tabriz, Iran
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Hosein Azarhava, Mehran Pourmohammad Abdollahi, Javad Musevi Niya, Mohammad Ali Tinati:
Joint resource allocation and UAV placement in UAV-assisted Wireless Powered Sensor Networks using TDMA and NOMA. Ad Hoc Networks 157: 103459 (2024) - [j30]Mehran Pourmohammad Abdollahi, Hosein Azarhava, Javad Musevi Niya, Mahdi Nangir:
Upper bound of outage probability in unmanned aerial vehicle-assisted cellular networks over fading channels. Veh. Commun. 50: 100840 (2024) - 2023
- [j29]Hosein Azarhava, Javad Musevi Niya, Mohammad Ali Tinati:
NOMA-based energy efficient resource allocation in wireless energy harvesting sensor networks. Comput. Commun. 209: 302-308 (2023) - [j28]Amiraslan Haghrah, Mehran Pourmohammad Abdollahi, Hosein Azarhava, Javad Musevi Niya:
A survey on the handover management in 5G-NR cellular networks: aspects, approaches and challenges. EURASIP J. Wirel. Commun. Netw. 2023(1): 52 (2023) - [j27]Mehran Pourmohammad Abdollahi, Javad Musevi Niya, Mahmood Mohassel Feghhi:
On the outage performance of energy harvesting NOMA-based simultaneous cooperate and transmit IoT networks. J. Ambient Intell. Humaniz. Comput. 14(6): 6423-6433 (2023) - [j26]Amiraslan Haghrah, Amirarslan Haghrah, Javad Musevi Niya, Sehraneh Ghaemi:
Handover triggering estimation based on fuzzy logic for LTE-A/5 G networks with ultra-dense small cells. Soft Comput. 27(22): 17333-17345 (2023) - [j25]S. Haleh S. Dizaji, Saeid Pashazadeh, Javad Musevi Niya:
Wasserstein generative adversarial networks for modeling marked events. J. Supercomput. 79(3): 2961-2983 (2023) - [i3]Solmaz Sorkhi Asbaghi, Mahmood Mohassel Feghhi, Javad Musevi Niya:
Resource Allocation for Secure Ultra-Reliable Low-Latency-Communication in IoT Applications. CoRR abs/2312.10555 (2023) - 2022
- [j24]Mehran Pourmohammad Abdollahi, Hosein Azarhava, Amiraslan Haghrah, Javad Musevi Niya:
On the Rate and Age of Information for non-preemptive systems with prioritized arrivals and deterministic packet deadlines in IoT networks. Ad Hoc Networks 124: 102717 (2022) - [j23]Mehran Pourmohammad Abdollahi, Javad Musevi Niya, Mahdi Nangir:
Optimizing the operator's economy in multi-tier cellular networks with underlaid D2D communications. Comput. Networks 217: 109322 (2022) - [j22]S. Haleh S. Dizaji, Saeid Pashazadeh, Javad Musevi Niya:
A Comparative Study of Some Point Process Models for Dynamic Networks. Complex. 2022: 1616116:1-1616116:21 (2022) - 2021
- [j21]Reza Sayyari, Jafar Pourrostam, Mir Javad Musevi Niya:
Cell-Free Massive MIMO System With an Adaptive Switching Algorithm Between Cooperative NOMA, Non-Cooperative NOMA, and OMA Modes. IEEE Access 9: 149227-149239 (2021) - 2020
- [j20]Hosein Azarhava, Mehran Pourmohammad Abdollahi, Javad Musevi Niya:
Age of information in wireless powered IoT networks: NOMA vs. TDMA. Ad Hoc Networks 104: 102179 (2020) - [j19]Kamal Adli Mehr, Javad Musevi Niya, Hadi Seyedarabi, Sina Khoshabi Nobar:
Secrecy capacity results for a secure NOMA-based cognitive radio network with an external eavesdropper. Phys. Commun. 43: 101224 (2020) - [j18]Sina Khoshabi Nobar, Javad Musevi Niya, Behzad Mozaffari Tazehkand:
Performance Analysis of Cognitive Wireless Powered Communication Networks Under Unsaturated Traffic Condition. IEEE Trans. Green Commun. Netw. 4(3): 819-831 (2020) - [j17]Hosein Azarhava, Javad Musevi Niya:
Energy Efficient Resource Allocation in Wireless Energy Harvesting Sensor Networks. IEEE Wirel. Commun. Lett. 9(7): 1000-1003 (2020) - [i2]Mahdi Nangir, Jafar Pourrostam, Javad Musevi Niya, Behzad Mozaffari Tazehkand:
Comparison Between the Joint and Successive Decoding Schemes for the Binary CEO Problem. CoRR abs/2004.05386 (2020)
2010 – 2019
- 2019
- [i1]Hamed Alizadeh Ghazijahani, Hadi Seyedarabi, Javad Musevi Niya, Ngai-Man Cheung:
Optimized Routing and Spectrum Assignment for Video Communication over an Elastic Optical Network. CoRR abs/1909.06536 (2019) - 2018
- [j16]Milad Abdollahzadeh, Hadi Seyedarabi, Javad Musevi Niya, Ngai-Man Cheung:
Optimal HEVC Configuration for Wireless Video Communication Under Energy Constraints. IEEE Access 6: 72479-72493 (2018) - [j15]Kamal Adli Mehr, Javad Musevi Niya, Nail Akar:
Queue management for two-user cognitive radio with delay-constrained primary user. Comput. Networks 142: 1-12 (2018) - [j14]Morteza Sharifi, Abbas Ali Sharifi, Mir Javad Musevi Niya:
Cooperative spectrum sensing in the presence of primary user emulation attack in cognitive radio network: multi-level hypotheses test approach. Wirel. Networks 24(1): 61-68 (2018) - [j13]Hamed Alizadeh Ghazijahani, Mir Javad Musevi Niya:
Non-Uniform Time Slot Based Modulation for Visible Light Communication System. Wirel. Pers. Commun. 98(2): 1753-1770 (2018) - 2017
- [j12]Javad Hajipour, Javad Musevi Niya, Derrick Wing Kwan Ng:
Energy-Efficient Resource Allocation in Buffer-Aided Wireless Relay Networks. IEEE Trans. Wirel. Commun. 16(10): 6648-6659 (2017) - 2016
- [j11]Abbas Ali Sharifi, Mir Javad Musevi Niya:
Defense Against SSDF Attack in Cognitive Radio Networks: Attack-Aware Collaborative Spectrum Sensing Approach. IEEE Commun. Lett. 20(1): 93-96 (2016) - [j10]Sina Khoshabi Nobar, Kamal Adli Mehr, Javad Musevi Niya:
RF-Powered Green Cognitive Radio Networks: Architecture and Performance Analysis. IEEE Commun. Lett. 20(2): 296-299 (2016) - [j9]Javad Hajipour, Cyril Leung, Javad Musevi Niya:
Context-Aware Relay Selection in Buffer-Aided Wireless Relay Networks. IEEE Commun. Lett. 20(12): 2502-2505 (2016) - [j8]Kamal Adli Mehr, Javad Musevi Niya:
Security bootstrapping of mobile ad hoc networks using identity-based cryptography. Secur. Commun. Networks 9(11): 1374-1383 (2016) - [j7]Samira Mir Mazhari Anvar, Sohrab Khanmohammadi, Javad Musevi Niya:
Game theoretic power allocation for fading MIMO multiple access channels with imperfect CSIR. Telecommun. Syst. 61(4): 875-886 (2016) - [j6]Abbas Ali Sharifi, Mir Javad Musevi Niya:
Securing Collaborative Spectrum Sensing Against Malicious Attackers in Cognitive Radio Networks. Wirel. Pers. Commun. 90(1): 75-91 (2016) - [c2]Abbas Ali Sharifi, Morteza Sharifi, Javad Musevi Niya:
Reputation-based Likelihood Ratio Test with anchor nodes assistance. IST 2016: 51-56 - [c1]Hamed Alizadeh Ghazijahani, Milad Abdollahzadeh, Hadi Seyedarabi, Mir Javad Musevi Niya:
Adaptive CSK modulation guaranteeing HEVC video quality over Visible Light Communication network. IST 2016: 789-794 - 2015
- [j5]Mehran Pourmohammad Abdollahi, Payman Mahmoudi Biroun, Javad Musevi Niya:
Network coding for relaying networks over double-link rayleigh fading channels using priority in decoding. Trans. Emerg. Telecommun. Technol. 26(4): 605-615 (2015) - [j4]Sina Khoshabi Nobar, Kamal Adli Mehr, Javad Musevi Niya:
Comprehensive Performance Analysis of IEEE 802157 CSMA/CA Mechanism for Saturated Traffic. JOCN 7(2): 62-73 (2015) - [j3]Kamal Adli Mehr, Sina Khoshabi Nobar, Javad Musevi Niya:
IEEE 802157 MAC Under Unsaturated Traffic: Performance Analysis and Queue Modeling. JOCN 7(9): 875-884 (2015) - [j2]Sina Khoshabi Nobar, Javad Musevi Niya:
Robust mitigation of selfish misbehavior in wireless networks. Secur. Commun. Networks 8(9): 1772-1779 (2015) - 2013
- [j1]Saber Meymanatabadi, Javad Musevi Niya, Behzad Mozaffari:
Selected Mapping Technique for PAPR Reduction Without Side Information Based on m-Sequence. Wirel. Pers. Commun. 71(4): 2523-2534 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 19:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint