Author of the publication

Continuously tracking of moving object by a combination of ultra-high frequency radio-frequency identification and laser range finder.

, , , , , and . IJDSN, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Embedded Ethernet Control Systems and Smart Node Design Method., and . ICNSC, page 42-46. IEEE, (2007)Foundational-circuit-based spice simulation., , , and . ISCAS, page 876-879. IEEE, (2008)Device identification based on H.264 cues., , , , , and . ChinaSIP, page 452-455. IEEE, (2013)Cryptanalysis and improvement of a certificateless aggregate signature scheme., , , , and . Inf. Sci., (2015)New adaptive bit allocation algorithms for multiuser OFDM/CDMA systems., , and . Wireless Networks, 15 (3): 341-351 (2009)Improved centroid extraction algorithm for autonomous star sensor., , and . IET Image Processing, 9 (10): 901-907 (2015)Dark Matter Results from First 98.7 Days of Data from the PandaX-II Experiment, , , , , , , , , and 44 other author(s). Phys. Rev. Lett., 117 (12): 121303 (September 2016)Maximum Vertical Penetration of Plane Turbulent Negatively Buoyant Jets, and . J. Engrg. Math., 123 (10): 973--977 (1997)Dipolar \Assisted\ \Assignment\ \Protocol\ (\DAAP\) for \MAS\ solid-state \NMR\ of rotationally aligned membrane proteins in phospholipid bilayers, , and . J. Magn. Reson., (May 2014)Public Concerns and Response Pattern toward Shared Mobility Security using Social Media Data., , , , and . ITSC, page 619-624. IEEE, (2019)