Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Overview primer on near-field UHF versus near-field HF RFID tags., and . IJRFITA, 1 (3): 291-302 (2007)Identification of Disjunctively Decomposable Logic Functions Employing a Karnaugh Map., , and . IEEE Trans. Computers, 18 (3): 277-279 (1969)Anti-collision policy for RFID systems: fast predict tags in field algorithm., , , , and . Int. J. Radio Freq. Identif. Technol. Appl., 3 (3): 215-228 (2011)Complex radio frequency (RF) communications with virtual pulses., , , and . Comput. Electr. Eng., 34 (5): 423-437 (2008)Optimal Decomposition of Large-Scale Networks., , and . IEEE Trans. Syst. Man Cybern., 9 (7): 369-375 (1979)Electromagnetic Interference of Cardiac Rhythmic Monitoring Devices to Radio Frequency Identification: Analytical Analysis and Mitigation Methodology., , and . IEEE Trans. Inf. Technol. Biomed., 15 (6): 848-853 (2011)A Field Programmable RFID Tag and Associated Design Flow., , , , , , , and . FCCM, page 165-174. IEEE Computer Society, (2006)Three dimensional sensing for environment and security control., , , , and . SMC, page 1284-1291. IEEE, (2003)On the computation of the generalized inverse by classical minimization., , and . Computing, 9 (3): 175-187 (1972)Determining the three-dimensional read accuracy of an RFID tag using a power scaling factor., and . IJRFITA, 3 (3): 155-165 (2011)