Author of the publication

1-Bit/2-Level Analog-to-Digital Conversion Based on Comparator and FPGA for Aperture Synthesis Passive Millimeter-Wave Imager.

, , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CNN-Based Object Recognition and Tracking System to Assist Visually Impaired People., , , , , , , and . IEEE Access, (2022)A Generalized Multi-Layer Framework for Video Coding to Select Prediction Parameters., , , and . IEEE Access, (2018)DGH-GO: dissecting the genetic heterogeneity of complex diseases using gene ontology., , , , and . BMC Bioinform., 24 (1): 171 (December 2023)Energy-Efficient Backscatter-Assisted Coded Cooperative-NOMA for B5G Wireless Communications., , , , , and . CoRR, (2022)Unsteady Flow of Fractional Fluid between Two Parallel Walls with Arbitrary Wall Shear Stress Using Caputo-Fabrizio Derivative., , , , , , and . Symmetry, 11 (4): 449 (2019)MCLA Task Offloading Framework for 5G-NR-V2X-Based Heterogeneous VECNs., , , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (12): 14329-14346 (December 2023)Important citation identification using sentiment analysis of in-text citations., , , , and . Telematics Informatics, (2021)Abstractive text summarization of low-resourced languages using deep learning., , , , , and . PeerJ Comput. Sci., (2023)Enhanced payload volume in the least significant bits image steganography using hash function., , , , , and . PeerJ Comput. Sci., (2023)Inferring Ties in Social IoT Using Location-Based Networks and Identification of Hidden Suspicious Ties., , , , , and . Sci. Program., (2020)