Author of the publication

Successive interference cancellation for cooperative communication systems.

, , , , , , and . ICHIT, volume 321 of ACM International Conference Proceeding Series, page 652-656. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Paradigm Vertical Handoff Algorithm in CDMA-WLAN Integrated Networks., , , and . KES (2), volume 3682 of Lecture Notes in Computer Science, page 446-452. Springer, (2005)Performance Evaluation of Convolutional Turbo Codes in AWGN and ITU-R Channels., , , and . ICIC (2), volume 3645 of Lecture Notes in Computer Science, page 695-703. Springer, (2005)Implementation of Smart Car Using Fuzzy Rules., , , , , , , , , and 5 other author(s). ICHIT (2), volume 206 of Communications in Computer and Information Science, page 609-616. Springer, (2011)Pre/Post Rake Receiver Design for Maximum SINR in MIMO Communication System., and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 449-457. Springer, (2005)Interference-Free ZCD-UWB for Wireless Home Network Applications., , , , , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 429-441. Springer, (2005)A Channel Sounding Scheme of MIMO-OFDM System for Intelligent Area Network., , , and . KES-AMSTA, volume 4496 of Lecture Notes in Computer Science, page 506-511. Springer, (2007)Design of Exhibition contents using swipe gesture recognition communication based on Kinect., , , , , and . ICOIN, page 346-347. IEEE Computer Society, (2015)A Study on Privacy-Related Considerations in Ubiquitous Computing Environment., , , and . KES (2), volume 3682 of Lecture Notes in Computer Science, page 460-463. Springer, (2005)Design and implementation of intracell reverse link using approximately synchronized CDMA., , , , , , and . PIMRC, page 256-260. IEEE, (2000)A Study for Method of Construct Encryption Scheme for Supporting Range Query Based on Bucket ID Transformation about Sensor Applications., , and . ISA, volume 200 of Communications in Computer and Information Science, page 292-305. Springer, (2011)