Author of the publication

Performance Analysis of RFID Protocols: CDMA Versus the Standard EPC Gen-2.

, , and . IEEE Trans Autom. Sci. Eng., 11 (4): 1250-1261 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Code Failure Prediction and Pattern Extraction Using LSTM Networks., and . BigDataService, page 55-62. IEEE, (2019)An efficient denoising method for color images., , , and . ISSPA, page 1-4. IEEE, (2007)A Bio-Inspired Content Adaptive Approach for Multiresolution-Based Image Watermarking., , , and . ICNC (3), page 58-62. IEEE Computer Society, (2007)A Probabilistic Approach for Detecting Blocking Attack in RFID Systems., , , and . ICC, page 1-6. IEEE, (2010)Toward a new wavelet-based watermarking approach for color images using bio-inspired optimization principles., , and . Digit. Signal Process., 22 (1): 153-162 (2012)Performance Analysis of RFID Protocols: CDMA Versus the Standard EPC Gen-2., , and . IEEE Trans Autom. Sci. Eng., 11 (4): 1250-1261 (2014)Protecting patient privacy from unauthorized release of medical images using a bio-inspired wavelet-based watermarking approach., , and . Digit. Signal Process., 21 (3): 433-446 (2011)Probabilistic Analysis of Blocking Attack in RFID Systems., , , , and . IEEE Trans. Inf. Forensics Secur., 6 (3-1): 803-817 (2011)Probabilistic Analysis and Correction of Chen's Tag Estimate Method., , , and . IEEE Trans Autom. Sci. Eng., 8 (3): 659-663 (2011)Code Failure Prediction and Pattern Extraction using LSTM Networks., and . CoRR, (2018)