Author of the publication

Estimation and Mitigation of Time-Variant RFI Based on Iterative Dual Sparse Recovery in Ultra-Wide Band Through-Wall Radar.

, , , , , and . IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 12 (9): 3398-3411 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web structure model based on granular computing., and . GrC, page 245-250. IEEE Computer Society, (2009)A Lower Bound of the L2 Norm Error Estimate for the Adini Element of the Biharmonic Equation., and . SIAM J. Numerical Analysis, 51 (5): 2651-2659 (2013)A computationally efficient associative memory model of hippocampus CA3 by spiking neurons., , , and . IJCNN, page 1-8. IEEE, (2013)StoryML: Enabling Distributed Interfaces for Interactive Media.. WWW (Posters), (2003)Learning Belief Networks in Domains with Recursively Embedded Pseudo Independent Submodels, and . CoRR, (2013)Graph-Based Detector for BLAST Architecture., and . ICC, page 1018-1023. IEEE, (2007)AdMoVeo: An Educational Robotic Platform For Learning Behavior Programming, and . DeSForM 2009: Design and Semantics of Form and Movement, page 218--219. (2009)Generating test cases from UML activity diagram based on Gray-box method, , , , , and . Software Engineering Conference, 2004. 11th Asia-Pacific, page 284- 291. (2004)First-principles studies of the electronic properties of native and substitutional anionic defects in bulk iron pyrite, , , and . Phys. Rev. B, 85 (8): 085203 (February 2012)A Privilege Separation Method for Security Commercial Transactions., , , and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 185-192. Springer, (2010)