Author of the publication

Performance of the interleaved (2, 1, 7) convolutional codes in mobile image communication system.

, , , and . WCNC, page 634-637. IEEE, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Iterative CZT-based frequency offset estimation for frequency-selective channels., , , and . ICC, page 2157-2161. IEEE, (2005)Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs)., , , , , , and . ACM Southeast Regional Conference (2), page 75-80. ACM, (2005)1-59593-059-0.A LSB steganography detection algorithm., , and . PIMRC, page 2780-2783. IEEE, (2003)Providing distributed certificate authority service in cluster-based mobile ad hoc networks., , , , and . Comput. Commun., 30 (11-12): 2442-2452 (2007)Soft decision decoding for multilevel coding with different mapping strategies in presence of fading., , and . WCNC, page 1436-1439. IEEE, (2000)Research on unequal error protection with punctured convolutional codes in image transmission system over mobile channels., , , and . WCNC, page 1253-1257. IEEE, (2000)A behavior analysis based Mobile Malware Defense System., , and . ICSPCS, page 1-6. IEEE, (2012)Separable and Anonymous Identity-Based Key Issuing., , , , , , , , and . ICPADS (2), page 275-279. IEEE Computer Society, (2005)Separable and Anonymous Identity-Based Key Issuing., , , , , , , , and . IACR Cryptology ePrint Archive, (2004)Behavior Classification based Self-learning Mobile Malware Detection., , , , , and . J. Comput., 9 (4): 851-858 (2014)