Author of the publication

Multiple speech source localization using ambiguity suppression.

, , and . SCIS&ISIS, page 1807-1811. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliable detection of sound's direction for human robot interaction., , , and . IROS, page 2411-2416. IEEE, (2004)Multiple speech source localization using ambiguity suppression., , and . SCIS&ISIS, page 1807-1811. IEEE, (2012)Moving Cast Shadow Elimination Algorithm Using Principal Component Analysis in Vehicle Surveillance Video., , , and . ICHIT, volume 4413 of Lecture Notes in Computer Science, page 139-148. Springer, (2006)Comments on "H∞ tracking design of uncertain nonlinear SISO systems: adaptive fuzzy approach" and reply., , , , , and . IEEE Trans. Fuzzy Syst., 6 (4): 605-606 (1998)Effective Intrusion Detection Model through the Combination of a Signature-based Intrusion Detection System and a Machine Learning-based Intrusion Detection System., , and . J. Inf. Sci. Eng., 22 (6): 1447-1464 (2006)Analysis of multivariate longitudinal data using ARMA Cholesky and hypersphere decompositions., , , and . Comput. Stat. Data Anal., (2021)Retractor mechanics in open-surgery., , , and . URAI, page 119-123. IEEE, (2016)Cross-eye Jamming System with Effective Cross-Eye Gain by the Phase and Gain Control., , , and . ICTC, page 1498-1500. IEEE, (2021)Moving Genetic Algorithm Based Fuzzy Modeling., , , and . J. Adv. Comput. Intell. Intell. Informatics, 3 (4): 320-325 (1999)Laboratory Verification Process for Redirection Algorithm Design using GNSS Deception., , , and . ICTC, page 251-253. IEEE, (2023)