Author of the publication

Discussions on Implementing Iterative Hard Thresholding Algorithm.

, and . IIH-MSP, page 17-20. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of heart rate variability processor for portable 3-lead ECG monitoring system-on-chip., , and . Expert Syst. Appl., 40 (5): 1491-1504 (2013)A VQ-Based Robust Multi-Watermarking Algorithm., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 85-A (7): 1719-1726 (2002)Multiple Watermarking for Compressed Sensing with Robust Transmission Applications., , , and . GCCE, page 371-372. IEEE, (2018)Applications of Reversible Data Hiding Techniques with the Quick Response Codes., , and . FGIT-SecTech, volume 58 of Communications in Computer and Information Science, page 1-8. Springer, (2009)Lossless Data Hiding with Genetic-Based Hybrid Prediction., , and . RVSP, page 5-8. IEEE Computer Society, (2013)Enhancements of Reversible Data Hiding by Interpolation-Based Prediction with Difference Alteration., , and . RVSP, page 147-150. IEEE Computer Society, (2015)Genetic Watermarking Based on Wavelet Packet Transform., and . HIS (1), page 262-265. IEEE Computer Society, (2009)Reversible Data Hiding using Histogram-based Difference Expansion., , and . ISCAS, page 1661-1664. IEEE, (2009)Conditionals Support in Binary Expression Tree Based Genetic Programming., and . LifeTech, page 310-313. IEEE, (2022)Information Protection and Recovery with Reversible Data Hiding., , , and . IIH-MSP, page 461-464. IEEE Computer Society, (2007)