Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Load Disturbance Resistance Speed Controller Design for PMSM., , , , and . IEEE Trans. Industrial Electronics, 53 (4): 1198-1208 (2006)Image object removal in redundant wavelet transform domain., , , and . Image Processing: Algorithms and Systems, volume 7245 of SPIE Proceedings, page 72450. SPIE, (2009)An intrusion detection technique based on continuous binary communication channels., , , and . IJSN, 6 (2/3): 174-180 (2011)VoDSL Information Management for Broadband Communication Network Access., , and . CIT, 15 (1): 17-24 (2007)Perceptual Masking Video Watermarking in 3D-RDWT Domain., , , and . IPCV, page 112-116. CSREA Press, (2008)Internet of Things and Blockchain Integration: Use Cases and Implementation Challenges., , , , and . BIS (Workshops), volume 373 of Lecture Notes in Business Information Processing, page 287-298. Springer, (2019)Signal and Modulation Type Detection Using Wavelet Transform., , , and . CSIE (1), page 457-460. IEEE Computer Society, (2009)Implementation of the Wavelet Transform-based Techniques for Static Testing of Mixed Signal Systems., and . Modelling and Simulation, page 56-59. IASTED/ACTA Press, (2003)A new parallel greedy bit-loading algorithm with fairness for multiple users in a DMT system., , and . IEEE Trans. Communications, 54 (8): 1374-1380 (2006)Dilation-3 PR QMF for image processing., , and . SSIAI, page 93-96. IEEE Computer Society, (2016)