default search action
Piya Kovintavewat
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Santi Koonkarnkhai, Kittipon Kankhunthod, Piya Kovintavewat:
An MLP-based skew angle mitigation method for bit-patterned magnetic recording. IEICE Electron. Express 21(13): 20240114 (2024) - 2022
- [c15]Anawin Khametong, Natthakan Rueangnetr, Chanon Warisarn, Santi Koonkarnkhai, Piya Kovintavewat:
Deep Neural Networks based Soft-Information Improvement for Two-head/Two-track Bit-Patterned Magnetic Recording. ISPACS 2022: 1-4 - [c14]J. Praiwan, Chaiwat Buajong, M. Mattayakan, Chanon Warisarn, Santi Koonkarnkhai, Piya Kovintavewat:
Soft Information Scheme Based Multilayer Perceptron in Coded Bit-Patterned Media Recording System. ISPACS 2022: 1-4 - [c13]Natthakan Rueangnetr, Chanon Warisarn, Santi Koonkarnkhai, Piya Kovintavewat:
Soft Information Adjustor for Four-Head/Two-Track (4H/2T) Bit-Patterned Magnetic Recording. ISPACS 2022: 1-3 - 2021
- [j10]Wiparat Busyatras, Chanon Warisarn, Santi Koonkarnkhai, Piya Kovintavewat:
A simple 2D modulation code in single-reader two-track reading BPMR systems. Digit. Commun. Networks 7(1): 100-106 (2021) - [j9]Santi Koonkarnkhai, Piya Kovintavewat:
An iterative ITI cancellation method for multi-head multi-track bit-patterned magnetic recording systems. Digit. Commun. Networks 7(1): 107-112 (2021) - 2020
- [j8]Santi Koonkarnkhai, Chanon Warisarn, Piya Kovintavewat:
A Novel ITI Suppression Technique for Coded Dual-Track Dual-Head Bit-Patterned Magnetic Recording Systems. IEEE Access 8: 153077-153086 (2020)
2010 – 2019
- 2017
- [c12]Ambar Bajpai, Abhishek Kalsi, Suvit Nakpeerayuth, Piya Kovintavewat, Lunchakorn Wuttisittikulkij:
A Greedy Search Based Method with Optimized Lower Bound for QC-LDPC Codes. ISADS 2017: 165-168 - 2016
- [j7]Ambar Bajpai, Gan Srirutchataboon, Piya Kovintavewat, Lunchakorn Wuttisittikulkij:
A New Construction Method for Large Girth Quasi-Cyclic LDPC Codes with Optimized Lower Bound using Chinese Remainder Theorem. Wirel. Pers. Commun. 91(1): 369-381 (2016) - 2015
- [j6]Chanon Warisarn, Autthasith Arrayangkool, Piya Kovintavewat:
An ITI-Mitigating 5/6 Modulation Code for Bit-Patterned Media Recording. IEICE Trans. Electron. 98-C(6): 528-533 (2015) - [j5]Wiparat Busyatras, Chanon Warisarn, Lin M. M. Myint, Piya Kovintavewat:
A TMR Mitigation Method Based on Readback Signal in Bit-Patterned Media Recording. IEICE Trans. Electron. 98-C(8): 892-898 (2015) - [j4]Chanon Warisarn, Piya Kovintavewat:
Soft-Output Decoding Approach of 2D Modulation Codes in Bit-Patterned Media Recording Systems. IEICE Trans. Electron. 98-C(12): 1187-1192 (2015) - 2014
- [c11]Panuwat Ketwong, Autthasith Arrayangkool, Chanon Warisarn, Lin Min Min Myint, Piya Kovintavewat:
A simple crossover-based coding technique for ITI mitigation in bit-patterned media recording. APSIPA 2014: 1-4 - 2013
- [j3]Autthasith Arrayangkool, Chanon Warisarn, Piya Kovintavewat:
A Recorded-Bit Patterning Scheme with Accumulated Weight Decision for Bit-Patterned Media Recording. IEICE Trans. Electron. 96-C(12): 1490-1496 (2013) - 2012
- [c10]Nitthita Chirdchoo, Piya Kovintavewat, Norrarat Wattanamongkhol, Lunchakorn Wuttisittikulkij, Pisit Vanichchanunt, Warakorn Srichavengsup:
Performance evaluation of channel reservation schemes for reservation-based MAC protocols with different priorities. ISCIT 2012: 1154-1159 - 2011
- [j2]Chanon Warisarn, Piya Kovintavewat, Pornchai Supnithi:
Iterative Timing Recovery with the Split-Preamble Strategy for Coded Partial Response Channels. IEICE Trans. Electron. 94-C(3): 368-374 (2011) - [c9]S. Koonkarnkhai, Phongsak Keeratiwintakorn, Nitthita Chirdchoo, Piya Kovintavewat:
Two-dimensional cross-track asymmetric target design for high-density bit-patterned media recording. ISPACS 2011: 1-4 - [c8]Chiranut Sa-ngiamsak, Minoru Okada, Trio Adiono, Piya Kovintavewat, Thanarat H. Chalidabhongse:
Technical program chairs' message. ISPACS 2011: 1 - [c7]Chanon Warisarn, Pornchai Supnithi, Piya Kovintavewat:
Reduced-complexity modified per-survivor iterative timing recovery using M-algorithm for magnetic recording system. ISPACS 2011: 1-4 - 2010
- [j1]Piya Kovintavewat:
Timing Recovery Strategies in Magnetic Recording Systems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(7): 1287-1299 (2010) - [c6]S. Jantarapatin, C. Mitrpant, Charturong Tantibundhit, T. Nuamcherm, Piya Kovintavewat:
Performance comparison of the authentication protocols in RFID system. MEDES 2010: 131-136
2000 – 2009
- 2005
- [c5]Piya Kovintavewat, John R. Barry, Mehmet Fatih Erden, Erozan M. Kurtas:
Reduced-complexity per-survivor iterative timing recovery for coded partial response channels. ICASSP (3) 2005: 841-844 - 2004
- [c4]Piya Kovintavewat, John R. Barry:
EXIT chart analysis for iterative timing recovery. GLOBECOM 2004: 2435-2439 - [c3]Piya Kovintavewat, John R. Barry, Mehmet Fatih Erden, Erozan M. Kurtas:
Per-survivor iterative timing recovery for coded partial response channels. GLOBECOM 2004: 2604-2608 - [c2]Piya Kovintavewat, John R. Barry, Mehmet Fatih Erden, Erozan M. Kurtas:
Per-survivor timing recovery for uncoded partial response channels. ICC 2004: 2715-2719 - 2003
- [c1]Piya Kovintavewat, John R. Barry, Mehmet Fatih Erden, Erozan M. Kurtas:
A new timing recovery architecture for fast convergence. ISCAS (2) 2003: 13-16
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint