Author of the publication

Efficient Non-Recursive Design of Second-Order Spectral-Null Codes.

, , , , , and . IEEE Trans. Inf. Theory, 62 (6): 3084-3102 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Plain and Diversity Combining Hybrid ARQ Protocols Over the m(geq 2)-Ary Asymmetric Channel., , and . IEEE Trans. Inf. Theory, 52 (12): 5550-5558 (2006)Secure Quantum Steganography Protocol for Fog Cloud Internet of Things., , , , and . IEEE Access, (2018)Fog Intelligence for Real-Time IoT Sensor Data Analytics., , , , , , and . IEEE Access, (2017)Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution., , , and . IEEE Access, (2023)Secure Medical Blockchain Model., , , , and . Inf., 14 (2): 80 (February 2023)A Dynamic Reconfigurable-Based Approach for Connectivity Mismatches of Web Services., and . ICDIPC (2), volume 189 of Communications in Computer and Information Science, page 67-81. Springer, (2011)On efficient second-order spectral-null codes using sets of m1-balancing functions., , , , , and . ISIT, page 141-145. IEEE, (2013)Big-Data Aggregating, Linking, Integrating and Representing Using Semantic Web Technologies., , and . AMLTA, volume 723 of Advances in Intelligent Systems and Computing, page 331-342. Springer, (2018)Efficient Non-Recursive Design of Second-Order Spectral-Null Codes., , , , , and . IEEE Trans. Inf. Theory, 62 (6): 3084-3102 (2016)Toward cognitive support for automated defect detection., , , , , and . Neural Comput. Appl., 32 (9): 4325-4333 (2020)