Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fast RFID tag identification algorithm based on counter and stack., , , , , , and . Expert Syst. Appl., 38 (6): 6829-6838 (2011)Bounds on Aperiodic Autocorrelation and Crosscorrelation of Binary LCZ/ZCZ Sequences., , and . IEICE Transactions, 88-A (12): 3636-3644 (2005)Special Section on Signal Design and its Application in Communications., and . IEICE Transactions, 91-A (12): 3663-3664 (2008)A Simple Method for Generating Optimal Z -Periodic Complementary Sequence Set Based on Phase Shift., , , and . IEEE Signal Process. Lett., 17 (10): 891-893 (2010)Queuing Analysis of HCCA for Multi-Rate Wireless LANs with Truncated ARQ Protocol., and . Wireless Personal Communications, 55 (4): 607-630 (2010)Optimum designs of high mobility wireless systems with channel estimation errors., , and . IET Communications, 9 (13): 1677-1682 (2015)Resource allocation in orthogonal frequency division multiple access-based cognitive radio systems with minimum rate constraints., , , and . Int. J. Communication Systems, 27 (8): 1147-1159 (2014)Capacity evaluation of packet-switched CDMA system., and . IEEE Communications Letters, 5 (8): 334-336 (2001)A feasible intrusion detector for recognizing IIS attacks based on neural networks., , , , and . Computers & Security, 27 (3-4): 84-100 (2008)Construction of Space/Wavelength/Time Spread Optical Code with Large Family Size., , and . IEEE Communications Letters, 16 (6): 893-896 (2012)