Author of the publication

A linear combination-based weighted least square approach for target localization with noisy range measurements.

, , , and . Signal Process., (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applicability evaluation of innovative simplified methods of slatted floor in pig houses - A CFD study., , , , , and . Comput. Electron. Agric., (January 2024)Camera calibration with one-dimensional objects moving under gravity., , , and . Pattern Recognit., 40 (1): 343-345 (2007)Energy-Efficient Spectrum Sharing for 6G Ubiquitous IoT Networks Through Blockchain., , , , and . IEEE Internet Things J., 10 (11): 9342-9352 (June 2023)Recognition of perspectively distorted planar grids., , and . Pattern Recognit. Lett., 27 (14): 1725-1731 (2006)A Novel Spatio-Temporal 3D Convolutional Encoder-Decoder Network for Dynamic Saliency Prediction., , and . IEEE Access, (2021)Research on Coordination Model of Multiplexed System Based on DEA., , , , and . ISNN (1), volume 5551 of Lecture Notes in Computer Science, page 1107-1114. Springer, (2009)Analysis of Binding Modes of Antigen-Antibody Complexes by Molecular Mechanics Calculation., , , , and . J. Chem. Inf. Model., 61 (5): 2396-2406 (2021)Stereoscopic saliency estimation with background priors based deep reconstruction., , , and . Neurocomputing, (2018)DarwinML: A Graph-based Evolutionary Algorithm for Automated Machine Learning., , , , , , , , and . CoRR, (2019)A methodological approach to analyze vulnerability of interdependent infrastructures., , , , and . Simul. Model. Pract. Theory, 17 (5): 817-828 (2009)