Author of the publication

A Closed-Form Localization Algorithm Using Angle-of-Arrival and Difference Time of Scan Time Measurements in Scan-Based Radar.

, , , and . IEEE Trans. Aerospace and Electronic Systems, 55 (1): 511-515 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Autonomous local path planning for a mobile robot using a genetic algorithm., , , , and . IEEE Congress on Evolutionary Computation, page 1338-1345. IEEE, (2004)Application of Exponential Hetero-Associative Memory on Frequency Classifier., , and . Inf. Process. Lett., 35 (6): 305-311 (1990)Thermal Parameter Monitoring of IGBT Module Using Junction Temperature Cooling Curves., , , , , and . IEEE Trans. Industrial Electronics, 66 (10): 8148-8160 (2019)An EV Charging Demand Model for the Distribution System Using Traffic Property., , , , and . IEEE Access, (2019)An Optimized Heterogeneous Structure LSTM Network for Electricity Price Forecasting., , , , and . IEEE Access, (2019)A neighborhood-characteristic-based detection model for statistical fragile watermarking with localization., , and . Multimedia Tools Appl., 52 (2-3): 307-324 (2011)Rotation and scale invariant target detection in optical remote sensing images based on pose-consistency voting., , , , and . Multimedia Tools Appl., 76 (12): 14461-14483 (2017)Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme., , , , and . IEEE Trans. Information Forensics and Security, 7 (1): 185-196 (2012)Audio Signal Classification Using Support Vector Machines., , , and . ISNN (2), volume 3972 of Lecture Notes in Computer Science, page 188-193. Springer, (2006)Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization., , and . Information Hiding, volume 5806 of Lecture Notes in Computer Science, page 132-145. Springer, (2009)