Author of the publication

Implementation of Adaptive Reed-Solomon Decoder for Context-Aware Mobile Computing Device.

, , and . KES (1), volume 3681 of Lecture Notes in Computer Science, page 1111-1117. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation of Smart Car Using Fuzzy Rules., , , , , , , , , and 5 other author(s). ICHIT (2), volume 206 of Communications in Computer and Information Science, page 609-616. Springer, (2011)Design of Exhibition contents using swipe gesture recognition communication based on Kinect., , , , , and . ICOIN, page 346-347. IEEE Computer Society, (2015)Performance Evaluation of Convolutional Turbo Codes in AWGN and ITU-R Channels., , , and . ICIC (2), volume 3645 of Lecture Notes in Computer Science, page 695-703. Springer, (2005)A New Paradigm Vertical Handoff Algorithm in CDMA-WLAN Integrated Networks., , , and . KES (2), volume 3682 of Lecture Notes in Computer Science, page 446-452. Springer, (2005)Interference-Free ZCD-UWB for Wireless Home Network Applications., , , , , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 429-441. Springer, (2005)Pre/Post Rake Receiver Design for Maximum SINR in MIMO Communication System., and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 449-457. Springer, (2005)A Channel Sounding Scheme of MIMO-OFDM System for Intelligent Area Network., , , and . KES-AMSTA, volume 4496 of Lecture Notes in Computer Science, page 506-511. Springer, (2007)Performance of Efficient Signal Detection for LED-ID Systems., , , , and . Wireless Personal Communications, 60 (3): 533-545 (2011)Maximum ratio combining for OFDM systems with cochannel interference., , and . IEEE Trans. Consumer Electronics, 52 (1): 87-91 (2006)A Study for Method of Construct Encryption Scheme for Supporting Range Query Based on Bucket ID Transformation about Sensor Applications., , and . ISA, volume 200 of Communications in Computer and Information Science, page 292-305. Springer, (2011)