Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BDAODV: A Security Routing Protocol to detect the Black hole Attacks in Mobile Ad Hoc Networks., , and . J. Commun., 17 (10): 803-811 (2022)A Comparative Study of Loop Filter Alternatives in Second-Order High-Pass ΔΣ Modulators., , and . IEEE Trans. Circuits Syst. I Regul. Pap., 58-I (11): 2604-2613 (2011)How to Maximize User Satisfaction Degree in Multi-service IP Networks., , and . ACIIDS, page 471-476. IEEE Computer Society, (2009)AIoT-based Neural Decoding and Neurofeedback for Accelerated Cognitive Training: Vision, Directions and Preliminary Results., , and . SSP, page 705-709. IEEE, (2023)NEPENTHE: Entropy-Based Pruning as a Neural Network Depth's Reducer., , , and . CoRR, (2024)A novel digital calibration technique for gain and offset mismatch in parallel TISigmaDelta ADCs., , and . ICASSP, page 4158-4161. IEEE, (2010)A Novel Approach to Non Coherent UWB Reception., , and . IMTIC, volume 20 of Communications in Computer and Information Science, page 100-109. Springer, (2008)A novel design methodology for multiplierless filters applied on ΔΣ decimators., , , and . ICECS, page 244-247. IEEE, (2011)Estimation techniques for timing mismatch in time-interleaved analog-to-digital converters: Limitations and solutions., , , and . ICECS, page 297-300. IEEE, (2016)Memory-Optimized Once-For-All Network., , , , and . CoRR, (2024)