Author of the publication

NLOS Identification and Positioning Algorithm Based on Localization Residual in Wireless Sensor Networks.

, , , , and . Sensors, 18 (9): 2991 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beamforming for hyperthermia treatment by training a weighted network of an ultrasonic array., , , , , and . Health Inf. Sci. Syst., 5 (1): 17 (2017)Airborne Aperture Synthesis Radiometers with Conformal Antenna Arrays., , , , , and . IGARSS, page 9125-9128. IEEE, (2019)Application of pattern recognition to the 1H NMR spectra of Chinese medicinal herbs for cold-hot nature distinguish., , , and . ICNC, page 3278-3281. IEEE, (2010)Parameter optimization of SVM based on HQGA., , , and . ICNC, page 2429-2433. IEEE, (2010)Gas chromatography-mass spectrometry combined Fisher statistics for the determination of Cold-Heat nature of Traditional Chinese Medicine., and . ICNC, page 4010-4013. IEEE, (2010)E-supply chains: understanding current and future opportunities and barriers., and . IJITM, 6 (2/3/4): 286-298 (2007)Simulation-based two-stage estimation for multiple nonparametric regression., , , and . Computational Statistics & Data Analysis, 55 (3): 1367-1378 (2011)A compact f-f model of high-dimensional piecewise-linear function over a degenerate intersection., , , and . IEEE Trans. on Circuits and Systems, 52-I (4): 815-821 (2005)A Two-Stage Deanonymization Attack against Anonymized Social Networks., , , and . IEEE Trans. Computers, 63 (2): 290-303 (2014)A New Scheme for Anonymous Secure Group Communication., , , , and . HICSS, page 1-9. IEEE Computer Society, (2011)