Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Time-Frequency Based Suspicious Activity Detection for Anti-Money Laundering., , , , , and . IEEE Access, (2021)Performance comparison of small scale fading elimination methods., , and . MSWiM, page 219-222. ACM, (2005)Throughput Enhancement in Multi-Carrier Systems Employing Overlapping Weyl-Heisenberg Frames., , and . ICC, page 1-6. IEEE, (2009)System throughput versus SINR constraint in cognitive radio networks., , , and . SPAWC, page 144-148. IEEE, (2012)Analysis of the urban/rural broadband divide in Canada: Using GIS in planning terrestrial wireless deployment., , , and . Gov. Inf. Q., 23 (3-4): 454-479 (2006)OFDM and externally modulated multi-mode fibers in radio over fiber sy., , and . IEEE Trans. Wirel. Commun., 5 (10): 2669-2674 (2006)Space-frequency coding reduces the collision rate in FH-OFDMA., and . IEEE Trans. Wirel. Commun., 4 (5): 2045-2050 (2005)Estimation of Directions of Arrival by Matching Pursuit (EDAMP)., , and . EURASIP J. Wireless Comm. and Networking, 2005 (2): 197-205 (2005)Blind Channel Estimation and Multi-User Detection for Wireless CDMA Systems., , and . ICC, page 4953-4958. IEEE, (2006)Adaptive Kalman Filtering for Local Mean Power Estimation in Mobile Communications., , , and . VTC Fall, page 1-4. IEEE, (2006)