Author of the publication

Automatic modulation classification in practical wireless channels.

, and . ICTC, page 915-917. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

3D Visible Light Indoor Positioning by Bokeh Based Optical Intensity Measurement in Smartphone Camera., , and . IEEE Access, (2019)An object-based middleware supporting efficient interoperability on a smart home network., , and . Multimedia Tools Appl., 63 (1): 227-246 (2013)Automatic modulation classification in practical wireless channels., and . ICTC, page 915-917. IEEE, (2016)Quality Improvement Algorithm for HDR Video Compression Based on HEVC., , , , and . TENCON, page 1258-1262. IEEE, (2018)Studies on various chip-on-film (COF) packages using ultra fine pitch two-metal layer flexible printed circuits (two-metal layer FPCs)., , , , and . Microelectron. Reliab., 52 (6): 1182-1188 (2012)Segmentation of ECG-gated multidetector row-CT cardiac images for functional analysis., , and . Medical Imaging: Image Processing, volume 4684 of SPIE Proceedings, SPIE, (2002)A design of ultra-low noise LDO using noise reduction network techniques., , , , , , and . ISOCC, page 198-199. IEEE, (2017)Modeling rule for analysis and design of e-learning content., and . ICHIT, volume 321 of ACM International Conference Proceeding Series, page 353-360. ACM, (2009)HiperSense: An Integrated System for Dense Wireless Sensing and Massively Scalable Data Visualization., , , and . SEUS, volume 5860 of Lecture Notes in Computer Science, page 252-263. Springer, (2009)Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats., , , and . DIMVA, volume 10885 of Lecture Notes in Computer Science, page 141-161. Springer, (2018)