Author of the publication

Designs of BCD Adder Based on Excess-3 Code in Quantum-Dot Cellular Automata.

, , , , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 70 (6): 2256-2260 (June 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint Optimization of FeICIC and Spectrum Allocation for Spectral and Energy Efficient Heterogeneous Networks., , , and . IEICE Trans. Commun., 101-B (6): 1462-1475 (2018)Performance of Space-Code-Division Multiple-Access Systems Using Reduced-Rank Detection., and . VTC Spring, page 1688-1692. IEEE, (2007)Wireless Energy Efficiency Evaluation for Buildings Under Design Based on Analysis of Interference Gain., , and . IEEE Trans. Veh. Technol., 69 (6): 6310-6324 (2020)Error probability analysis of FFH/MFSK receivers over frequency-selective Rician-fading channels with partial-band-noise jamming., , and . IEEE Trans. Commun., 57 (10): 2880-2885 (2009)Location-Aware Cross-Tier Cooperation for Massive MIMO Heterogeneous Networks., , , , , and . IEEE Wirel. Commun. Lett., 9 (9): 1577-1580 (2020)Wireless Channel Delay Spread Performance Evaluation of a Building Layout., , and . IEEE Trans. Veh. Technol., 72 (11): 13836-13847 (November 2023)Secrecy Analysis of Wireless-Powered Multi-Antenna Relaying System With Nonlinear Energy Harvesters and Imperfect CSI., , and . TGCN, 2 (2): 460-470 (2018)Combinational Logic Binding for FPGA System Security.. Trustcom/BigDataSE/ISPA, page 216-223. IEEE, (2016)Adversarial Examples: Attacks on Machine Learning-based Malware Visualization Detection Methods., , , and . CoRR, (2018)GASF-IPP: Detection and Mitigation of LDoS Attack in SDN., , , , and . IEEE Trans. Serv. Comput., 16 (5): 3373-3384 (September 2023)