Author of the publication

Detection and classification of unknown MTI and PBNI in slow FH/BFSK systems over Rayleigh fading channels.

, , and . ICICS, page 1-5. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Unknown Multitone Interference Using the AR Method in Slow FH/BFSK Systems over Rayleigh Fading Channels., , and . VTC Fall, page 1-5. IEEE, (2011)Performance evaluation of improved double-threshold energy detector over Rayleigh-faded sensing and imperfect reporting channels., and . Phys. Commun., (2015)Analysis of switch diversity combining over two wave with diffuse power fading., , and . IET Commun., 6 (9): 1061-1067 (2012)Blind Detection of Interleaver Parameters for Non-Binary Coded Data Streams., , and . ICC, page 1-4. IEEE, (2009)Performance Evaluation for Forward-Link Cellular DS-CDMA over Frequency-Selective Nakagami Multipath Fading Channels., and . Wireless Personal Communications, 18 (3): 275-287 (2001)Application of compressive sensing to limited feedback strategy in large-scale multiple-input single-output cellular networks., , and . IET Commun., 8 (6): 947-955 (2014)Low-complexity channel estimation and turbo equalisation for high frequency channels., , and . IET Commun., 7 (10): 980-987 (2013)Maximum-likelihood receivers for synchronous fast frequency-hopped multiple-access M-ary frequency-shift-keying systems over frequency-selective Rician-fading channels., , and . IET Commun., 6 (17): 2870-2878 (2012)An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems., , , and . IEEE Trans. Inf. Forensics Secur., 10 (5): 932-940 (2015)Achieving Optimal Diversity-Multiplexing Tradeoff for Full-Duplex MIMO Multihop Relay Networks., , and . IEEE Trans. Inf. Theory, 57 (1): 303-316 (2011)