Author of the publication

Threshold-based cooperative communication of energy harvesting active networked tags.

, , , , and . Int. J. Ad Hoc Ubiquitous Comput., 24 (4): 225-236 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parametric programming to the analysis of fuzzy queues., , and . Fuzzy Sets Syst., 107 (1): 93-100 (1999)Analysis of the effects of linearity and efficiency of amplifiers in QAM systems., and . WCNC, page 475-479. IEEE, (2003)A Robust Decoding Scheme for Convolutionally Coded Transmission Through a Markov Gaussian Channel., , , , and . IEEE Trans. Veh. Technol., 63 (9): 4344-4356 (2014)How to solve collision and authentication issues using RFID protocol technology., , , , and . ICMLC, page 454-460. IEEE, (2011)Robust Clipping for OFDM Transmissions over Memoryless Impulsive Noise Channels., , , , and . IEEE Commun. Lett., 16 (7): 1110-1113 (2012)A novel memoryless AES cipher architecture for networking applications., , , , and . ISCAS (4), page 333-336. IEEE, (2004)A robust receiver for OFDM systems in nonlinear impulse channels., , and . ISTT, page 413-416. IEEE, (2014)Threshold-based cooperative communication of energy harvesting active networked tags., , , , and . Int. J. Ad Hoc Ubiquitous Comput., 24 (4): 225-236 (2017)Robust Turbo Decoding in a Markov Gaussian Channel., , , , , and . IEEE Wirel. Commun. Lett., 3 (6): 633-636 (2014)A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol., , and . IEICE Trans. Inf. Syst., 91-D (5): 1408-1415 (2008)