×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
THE STATE KEY LA... [1]
Faculty of Scien... [1]
Authors
WU YUAN [1]
Document Type
Journal article [2]
Date Issued
2024 [1]
2022 [1]
Language
英語English [2]
Source Publication
IEEE Transaction... [1]
IEEE Wireless Co... [1]
Indexed By
SCIE [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-2 of 2
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Title Ascending
Title Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Author Ascending
Author Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Delay-Minimized Resource Allocation in Relay-Assisted NOMA-WPT Industrial IoT Networks
Journal article
Wang, Qianru, Qian, Li Ping, Li, Mingqing, Jiang, Wei, Wu, Yuan. Delay-Minimized Resource Allocation in Relay-Assisted NOMA-WPT Industrial IoT Networks[J]. IEEE Transactions on Green Communications and Networking, 2024.
Authors:
Wang, Qianru
;
Qian, Li Ping
;
Li, Mingqing
;
Jiang, Wei
;
Wu, Yuan
Favorite
|
TC[Scopus]:
0
IF:
5.3
/
4.5
|
Submit date:2024/12/05
Wireless Power Transfer
Non-orthogonal Multiple Access
Bisection Searching
Karush-kuhn-tucker
Cross-entropy
Alternative Optimization for Secrecy Throughput Maximization in UAV-Aided NOMA Networks
Journal article
Qian Liping, Zhang Wenjie, Wang Qian, Wu Yuan, Yang Xiaoniu. Alternative Optimization for Secrecy Throughput Maximization in UAV-Aided NOMA Networks[J]. IEEE Wireless Communications Letters, 2022, 11(12), 2580-2584.
Authors:
Qian Liping
;
Zhang Wenjie
;
Wang Qian
;
Wu Yuan
;
Yang Xiaoniu
Favorite
|
TC[WOS]:
8
TC[Scopus]:
9
IF:
4.6
/
4.9
|
Submit date:2023/01/30
Secrecy Throughput Maximization
Non-orthogonal Multiple Access
Successive Convex Approximation
Cross-entropy