Author of the publication

Cyclic Odd Bit Inversion Code Mapping and Modulation Scheme for IEEE 802.15.4b 915MHz Wireless Personal Area Networks.

, , , and . PIMRC, page 1-5. IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhance picking viability in E-commerce warehouses under pandemic., , and . Int. J. Prod. Res., 61 (15): 5302-5321 (2023)Network lifetime enhancement of WSNs using correlation model and node selection algorithm., and . Ad Hoc Networks, (2021)Explainable anomaly detection for procurement fraud identification - lessons from practical deployments., , , , , and . Int. Trans. Oper. Res., 28 (6): 3276-3302 (2021)Iterative Decoding with Blind Channel Estimation in a SIMO FIR Channel., and . PIMRC, page 1-5. IEEE, (2006)Turbo Coding with Blind Channel Estimation in a SIMO FIR Channel., and . VTC Fall, page 1-5. IEEE, (2006)A fuzzy based matrix methodology for evaluation and ranking of data warehouse conceptual models metrics., , and . Int. Arab J. Inf. Technol., 15 (2): 202-212 (2018)A Low Complexity Mapping and Modulation Scheme for IEEE 802.15.4b., , , and . ICC, page 4023-4027. IEEE, (2007)Fuzzy based novel clustering technique by exploiting spatial correlation in wireless sensor network., and . J. Ambient Intell. Humaniz. Comput., 10 (4): 1361-1378 (2019)Comparative Study on Strengths and Weaknesses of Trust Algorithms in Semantic Web Based Networks., , and . ACITY (3), volume 178 of Advances in Intelligent Systems and Computing, page 473-479. Springer, (2012)Security enforcement using PKI in Semantic Web., , , and . CISIM, page 392-397. IEEE, (2010)