Author of the publication

Sparse-based false target identification in pulse-Doppler radar with random pulse initial phase.

, , , , and . WCSP, page 1-5. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prolonged Mobile Phone Use Is Associated with Poor Academic Performance in Adolescents., , , , , and . Cyberpsychology Behav. Soc. Netw., 23 (5): 303-311 (2020)Optimal Robot Scheduling for Web Search Engines, , and . Journal of Scheduling, 1 (1): 15--29 (June 1998)Die verbotene Stadt der Nonnen. Geo,   (8): 54-73 (2010)Assessing models of speciation under different biogeographic scenarios; an empirical study using multi-locus and RNA-seq analyses, , , , , , , and . Ecology and Evolution, (2015)A Hybrid Method Combining Improved StochSim with SSA for Solving Systems with Multi-State Species., , and . BIOCOMP, page 626-631. CSREA Press, (2009)A public key encryption scheme based on compressed sensing.. ICAIT, page 20-24. IEEE, (2017)Closed-Form Algorithm for 3-D Near-Field OFDM Signal Localization under Uniform Circular Array., , , and . Sensors, 18 (1): 226 (2018)A smart hill-climbing algorithm for application server configuration., , , , and . WWW, page 287-296. ACM, (2004)Design and Implementation of Hardware Accelerator for Gaussian Filter Based on HLS., , , and . IGTA, volume 1043 of Communications in Computer and Information Science, page 161-171. Springer, (2019)Cryptanalysis of an NTRU-Based Proxy Encryption Scheme from ASIACCS'15., , and . PQCrypto, volume 11505 of Lecture Notes in Computer Science, page 153-166. Springer, (2019)