Alert button
Picture for Vinod Sharma

Vinod Sharma

Alert button

Performance of Queueing Models for MISO Content-Centric Networks

Add code
Bookmark button
Alert button
Nov 15, 2021
Ramkumar Raghu, Mahadesh Panju, Vinod Sharma

Figure 1 for Performance of Queueing Models for MISO Content-Centric Networks
Figure 2 for Performance of Queueing Models for MISO Content-Centric Networks
Figure 3 for Performance of Queueing Models for MISO Content-Centric Networks
Figure 4 for Performance of Queueing Models for MISO Content-Centric Networks
Viaarxiv icon

Deep Reinforcement Learning Based Power control for Wireless Multicast Systems

Add code
Bookmark button
Alert button
Oct 24, 2019
Ramkumar Raghu, Pratheek Upadhyaya, Mahadesh Panju, Vaneet Aggarwal, Vinod Sharma

Figure 1 for Deep Reinforcement Learning Based Power control for Wireless Multicast Systems
Figure 2 for Deep Reinforcement Learning Based Power control for Wireless Multicast Systems
Figure 3 for Deep Reinforcement Learning Based Power control for Wireless Multicast Systems
Figure 4 for Deep Reinforcement Learning Based Power control for Wireless Multicast Systems
Viaarxiv icon

Performance Based Evaluation of Various Machine Learning Classification Techniques for Chronic Kidney Disease Diagnosis

Add code
Bookmark button
Alert button
Jul 18, 2016
Sahil Sharma, Vinod Sharma, Atul Sharma

Figure 1 for Performance Based Evaluation of Various Machine Learning Classification Techniques for Chronic Kidney Disease Diagnosis
Figure 2 for Performance Based Evaluation of Various Machine Learning Classification Techniques for Chronic Kidney Disease Diagnosis
Figure 3 for Performance Based Evaluation of Various Machine Learning Classification Techniques for Chronic Kidney Disease Diagnosis
Figure 4 for Performance Based Evaluation of Various Machine Learning Classification Techniques for Chronic Kidney Disease Diagnosis
Viaarxiv icon

Resource Allocation in a MAC with and without security via Game Theoretic Learning

Add code
Bookmark button
Alert button
Jul 05, 2016
Shahid Mehraj Shah, Krishna Chaitanya A, Vinod Sharma

Figure 1 for Resource Allocation in a MAC with and without security via Game Theoretic Learning
Figure 2 for Resource Allocation in a MAC with and without security via Game Theoretic Learning
Figure 3 for Resource Allocation in a MAC with and without security via Game Theoretic Learning
Figure 4 for Resource Allocation in a MAC with and without security via Game Theoretic Learning
Viaarxiv icon