Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ad Hoc Network Hybrid Management Protocol Based on Genetic Classifiers., , and . Wirel. Eng. Technol., 1 (2): 69-80 (2010)A dedicated DMA logic addressing a time multiplexed memory to reduce the effects of the system bus bottleneck., , , and . FPL, page 487-490. IEEE, (2008)A Blind Video Watermarking Algorithm for Copyright Protection based on Dual Tree Complex Wavelet Transform., , , and . J. Inf. Hiding Multim. Signal Process., 7 (6): 1147-1167 (2016)Implementation of W-CDMA Cell Search on a Highly Parallel and Scalable MPSoC., , , , and . J. Signal Process. Syst., 64 (1): 137-148 (2011)HDDM Hardware Evaluation for Robust Interference Mitigation., , , , and . Sensors, 20 (22): 6492 (2020)Wide-Band Interference Mitigation in GNSS Receivers Using Sub-Band Automatic Gain Control., , , , , and . Sensors, 22 (2): 679 (2022)The Internet of Everything based integrated security system of the World War One Commemorative Museum of Fogliano Redipuglia in Italy., and . ICCST, page 1-8. IEEE, (2016)Emotional analysis of safeness and risk perception of drones during the COVID-19 pandemic in Italy., , , , and . ICCST, page 1-6. IEEE, (2021)Facial Expression Recognition using Transfer Learning., and . ICCST, page 1-5. IEEE, (2018)Efficient FFT pruning algorithm for non-contiguous OFDM systems., , and . DASIP, page 144-149. IEEE, (2011)