Author of the publication

Construction of Near-Complementary Sequences with Low PMEPR for Peak Power Control in OFDM.

, , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (11): 1881-1887 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some classes of monomial complete permutation polynomials over finite fields of characteristic two., , , and . Finite Fields Their Appl., (2014)Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI., , , , , , and . IEEE Trans. Mob. Comput., 18 (2): 362-375 (2019)A New Method to Construct Gloay Complementary Set by Paraunitary Matrices and Hadamard Matrices., , and . CoRR, (2019)Research on Security Assessment of Cross Border Data Flow., , , , and . FCS, volume 1558 of Communications in Computer and Information Science, page 327-341. Springer, (2021)Several classes of optimal p-ary cyclic codes with minimum distance four., , and . Finite Fields Their Appl., (December 2023)Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports., , , , , , , , and . FCS, volume 1558 of Communications in Computer and Information Science, page 78-99. Springer, (2021)Construction of near-complementary sequences of length n · 2m., and . IWSDA, page 19-23. IEEE, (2015)An Approach for Predicting the Popularity of Online Security News Articles., , , and . CNS, page 1-6. IEEE, (2018)A Note on Cross-Correlation Distribution Between a Ternary m -Sequence and Its Decimated Sequence., , and . SETA, volume 8865 of Lecture Notes in Computer Science, page 249-259. Springer, (2014)Catch the Butterfly: Peeking into the Terms and Conflicts among SPDX Licenses., , , , , , and . CoRR, (2024)