Author of the publication

The Key-bits in Turbo Codes and Their Protections.

, , , , and . AINA (2), page 366-369. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A smart bushfire monitoring and detection system using GSM technology., , , and . IJCAET, 2 (2/3): 218-233 (2010)Fair Exchange Signature Schemes., , , , and . AINA Workshops, page 422-427. IEEE Computer Society, (2008)Structure Sparsity for Multi-camera Gait Recognition., , , and . CCPR, volume 321 of Communications in Computer and Information Science, page 259-267. Springer, (2012)Coordinate relationship extraction on sentence level in Chinese corpus., , and . ICNC, page 127-135. IEEE, (2013)A Novel Secure Authentication Scheme for Heterogeneous Internet of Things., , , , , and . ICC, page 1-6. IEEE, (2019)Piggybacking Belief Propagation Decoding for Rateless Codes Based on RA Structure., , , , , and . ICCC, page 237-241. IEEE, (2018)Prediction-Based Spectrum Access Optimization in Cognitive Radio Networks., , , , , and . PIMRC, page 1-7. IEEE, (2018)On the Linear Complexity of Some Ternary Sequences with Ideal Autocorrelation., , , and . IEICE Transactions, 91-A (2): 709-712 (2008)The Security Analyses of RosettaNet in Grid., , , and . ICPADS (2), page 540-544. IEEE Computer Society, (2005)IntApop: A web service for predicting apoptotic protein interactions in humans., , , , , , , and . Biosystems, 114 (3): 238-244 (2013)