Author of the publication

Signal Processing Method Based on First-Order Derivative and Multifeature Parameters Combined With Reference Curve for GWRLG.

, , and . IEEE Trans. Instrum. Meas., 64 (12): 3423-3433 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BCMCMI: A Fusion Model for Predicting circRNA-miRNA Interactions Combining Semantic and Meta-path., , , , and . J. Chem. Inf. Model., 63 (16): 5384-5394 (August 2023)Ultra-Wideband-Based Localization for Quadcopter Navigation., , , , , , and . Unmanned Systems, 4 (1): 23-34 (2016)Complementary Coded Scrambling Multiple Access and Its Performance in Downlink MIMO Channels., , , , and . IEEE Trans. Wirel. Commun., 17 (2): 835-847 (2018)A Lightweight and Secure Group Key Based Handover Authentication Protocol for the Software-Defined Space Information Network., , , , and . IEEE Trans. Wirel. Commun., 19 (6): 3673-3684 (2020)A low-cost architecture for multi-mode Reed-Solomon decoder., , , , and . ISOCC, page 332-334. IEEE, (2012)High-Order Model-Free Adaptive Iterative Learning Control of Pneumatic Artificial Muscle With Enhanced Convergence., , , , , , and . IEEE Trans. Ind. Electron., 67 (11): 9548-9559 (2020)Prediction of China's Sulfur Dioxide Emissions by Discrete Grey Model with Fractional Order Generation Operators., , and . Complex., (2018)A local tournament contains a vertex whose out-arcs are pseudo-girth-pancyclic., , , and . J. Graph Theory, 62 (4): 346-361 (2009)DF-PLSTM-FCN: A Method for Unmanned Driving Based on Dual-Fusions and Parallel LSTM-FCN., , , and . ICONIP (1), volume 12532 of Lecture Notes in Computer Science, page 75-87. Springer, (2020)Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising., , , , and . ACM Conference on Computer and Communications Security, page 129-140. ACM, (2014)