Author of the publication

Tracking and identifying a magnetic spheroid target using unscented particle filter.

, , , and . ICDIP, volume 8009 of SPIE Proceedings, page 800931. SPIE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RIHT: A Novel Hybrid IP Traceback Scheme., and . IEEE Trans. Information Forensics and Security, 7 (2): 789-797 (2012)An Anonymous Car Rental System Based on NFC., , and . ISBAST, IEEE, (2013)Tracking and identifying a magnetic spheroid target using unscented particle filter., , , and . ICDIP, volume 8009 of SPIE Proceedings, page 800931. SPIE, (2011)Magnetic Field Extrapolation Based on Improved Back Propagation Neural Network., , , , and . AICI (1), volume 6319 of Lecture Notes in Computer Science, page 64-70. Springer, (2010)Hybrid congestion control for high-speed networks., , , , , and . J. Network and Computer Applications, 34 (4): 1416-1428 (2011)A novel sequential watermark detection model for efficient traceback of secret network attack flows., , and . J. Network and Computer Applications, 36 (6): 1660-1670 (2013)AdaBoost-based face detection for embedded systems., , , , and . Computer Vision and Image Understanding, 114 (11): 1116-1125 (2010)High-bitrate multimedia information hiding for digital image/video under lossy compression., and . J. Electronic Imaging, 16 (1): 013008 (2007)Doppler Spread Estimation by Tracking the Delay-Subspace for OFDM Systems in Doubly Selective Fading Channels., , , and . IEEE Signal Process. Lett., 16 (3): 212-215 (2009)A Comparative Survey on Cryptology-Based Methodologies., , and . IJISP, 6 (3): 1-37 (2012)