Author of the publication

MC-TDMA scheme for downlink broadband wireless communications.

, , and . ICC, page 944-948. IEEE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Scale Gradient Invariant for Face Recognition under varying Illumination., , , and . IJPRAI, (2012)Research of RFID Certification Security Protocol based on Hash Function and DES Algorithm., , and . JNW, 8 (10): 2368-2375 (2013)An improved signal subspace estimation method and its application to multiuser detection., , and . WCNC, page 58-60. IEEE, (2002)The strategic asset allocation optimization model of sovereign wealth funds based on maximum CRRA utility & minimum VAR., , , and . ICCS, volume 1 of Procedia Computer Science, page 2433-2440. Elsevier, (2010)Groundwater Quality Research Based on PDA and 3S Technology., , and . ESIAT (2), page 301-305. IEEE Computer Society, (2009)MC-TDMA scheme for downlink broadband wireless communications., , and . ICC, page 944-948. IEEE, (2005)Disturbance Observer-Based Dynamic Surface Control of Transport Aircraft With Continuous Heavy Cargo Airdrop.. IEEE Trans. Systems, Man, and Cybernetics: Systems, 47 (1): 161-170 (2017)Performance evaluation in PAPR and ICI for ISIM-OFDM systems., , , , , and . HMWC, page 84-88. IEEE, (2014)Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip., , , , , , , , , and 1 other author(s). UIC/ATC/ScalCom, page 1397-1401. IEEE Computer Society, (2015)Web services searching based on domain ontology., , , and . SOSE, page 51-55. IEEE Computer Society, (2005)