Author of the publication

Design, Simulation and Implementation of a Channel Equalizer for DVB-T On-channel Repeaters.

, , , , and . ICSNC, page 11-16. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and implementation of a direct RF-to-digital UHF-TV multichannel transceiver., , , and . ISCAS, page 3925-3928. IEEE, (2010)Centralized and distributed spectrum channel assignment in cognitive wireless networks: A Harmony Search approach., , , and . Appl. Soft Comput., 12 (2): 921-930 (2012)CURIE: A Cellular Automaton for Concept Drift Detection., , , , and . CoRR, (2020)Explainable Artificial Intelligence (XAI): Concepts, Taxonomies, Opportunities and Challenges toward Responsible AI, , , , , , , , , and 2 other author(s). (2019)cite arxiv:1910.10045Comment: 67 pages, 13 figures, accepted for its publication in Information Fusion.Explainable Artificial Intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI, , , , , , , , , and 2 other author(s). Information Fusion, (2020)A new grouping genetic algorithm for clustering problems., , , , , and . Expert Syst. Appl., 39 (10): 9695-9703 (2012)A novel grouping harmony search algorithm for the multiple-type access node location problem., , , , and . Expert Syst. Appl., 39 (5): 5262-5270 (2012)An active adaptation strategy for streaming time series classification based on elastic similarity measures., , , and . Neural Comput. Appl., 34 (16): 13237-13252 (2022)A hybrid harmony search algorithm for the spread spectrum radar polyphase codes design problem., , , , , and . Expert Syst. Appl., 39 (12): 11089-11093 (2012)A novel machine learning approach to the detection of identity theft in social networks based on emulated attack instances and support vector machines., , , , and . Concurr. Comput. Pract. Exp., 28 (4): 1385-1395 (2016)