Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of Key Techniques for Packet Traffics in Multi-Carrier LCR TDD Systems., , and . VTC Fall, page 1-5. IEEE, (2008)System Layer Evaluation of Joint Detection and Imperfect Adaptive Beam-Forming Antenna for Packet Services in the LCR TD-CDMA System., , , , and . VTC Fall, page 427-431. IEEE, (2007)Related-key cryptanalysis on 7-round AES-128/192., , , and . IJESDF, 7 (2): 166-178 (2015)The adaptive chirplet transform and visual evoked potentials., and . IEEE Trans. Biomed. Engineering, 53 (7): 1378-1384 (2006)Automated search for arthritic patterns in infrared spectra of synovial fluid using adaptive wavelets and fuzzy C-Means analysis., , and . IEEE Trans. Biomed. Engineering, 53 (5): 800-809 (2006)An efficient quantum scheme for Private Set Intersection., , , , and . Quantum Information Processing, 15 (1): 363-371 (2016)Existence of a folding in multidimensional coding., , and . Discrete Mathematics, (2014)An efficient delay-restricted scheduling algorithm for multi-carrier TD-HSDPA systems., , , and . PIMRC, page 1416-1421. IEEE, (2009)Performance Study on the ECID Positioning Enhancement in LTE-A Het-Net with RRH., , , and . VTC Fall, page 1-5. IEEE, (2015)Many-to-one homomorphic encryption scheme., , , and . Security and Communication Networks, 9 (10): 1007-1015 (2016)