Author of the publication

The Polarization Suppression Method of the Local Radar Disturbances in Polarized Receiving.

, , , and . PACIIA (2), page 992-996. IEEE Computer Society, (2008)978-0-7695-3490-9.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anti-Sweep Jamming Design and Implementation Using Multi-Channel Harmonic Timing Sequence Detection for Short-Range FMCW Proximity Sensors., , , and . Sensors, 17 (9): 2042 (2017)Radar Emitter Recognition Based on SIFT Position and Scale Features., , , , and . IEEE Trans. on Circuits and Systems, 65-II (12): 2062-2066 (2018)Image Speckle Reduction and Coherence Enhancement in Underwater Ultrasonic Imaging Based on Wavelet Transform., , , and . CSSE (6), page 145-148. IEEE Computer Society, (2008)978-0-7695-3336-0.On the security of a dynamic identity-based remote user authentication scheme with verifiable password update., , , and . Int. J. Communication Systems, 28 (5): 842-847 (2015)The Polarization Suppression Method of the Local Radar Disturbances in Polarized Receiving., , , and . PACIIA (2), page 992-996. IEEE Computer Society, (2008)978-0-7695-3490-9.Research on Polarization Parameter Extraction in Radar Reconnaissance., , , and . PACIIA (2), page 997-1001. IEEE Computer Society, (2008)978-0-7695-3490-9.Modeling the Influence of Oil Film, Position and Orientation Parameters on the Accuracy of a Laser Triangulation Probe., , , and . Sensors, 19 (8): 1844 (2019)Chaos characteristics analysis of transient signals for phase-locked synthesizer based FHC system., , , , , and . ISCIT, page 458-461. IEEE, (2014)A new method for extracting instantaneous frequency feature of emitter signal., , , and . ICDIP, volume 8009 of SPIE Proceedings, page 800935. SPIE, (2011)New certificateless public key encryption scheme without pairing., , , , and . IET Information Security, 7 (4): 271-276 (2013)