Author of the publication

An intelligent through-the-wall recognition system for homeland security.

, , and . IJCNN, page 2084-2090. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning from Deep Representations of Multiple Networks for Predicting Drug-Target Interactions., , , , , , and . ICIC (2), volume 11644 of Lecture Notes in Computer Science, page 151-161. Springer, (2019)Generalized Rational Functions for Reduced-Complexity Behavioral Modeling and Digital Predistortion of Broadband Wireless Transmitters., , , , and . IEEE Trans. Instrumentation and Measurement, 63 (2): 485-498 (2014)Fuzzy Cognitive Map Based Situation Assessment Framework for Navigation Goal Detection., , and . SMC, page 1444-1449. IEEE, (2013)Semiparametric Decolorization With Laplacian-Based Perceptual Quality Metric., , , and . IEEE Trans. Circuits Syst. Video Techn., 27 (9): 1856-1868 (2017)A Chaotic Authentication Technique for Digital Video Surveillance., and . ICASSP (2), page 533-536. IEEE, (2005)Through the Wall Imaging using Chaotic Modulated Ultra Wideband Synthetic Aperture Radar., and . ICASSP (3), page 1257-1260. IEEE, (2007)Speech Bandwidth Extension by Data Hiding and Phonetic Classification., and . ICASSP (4), page 593-596. IEEE, (2007)A Self-Adaptive and Wide-Range Conductivity Measurement Method Based on Planar Interdigital Electrode Array., , , , , and . IEEE Access, (2019)An Automated Change Detection Approach for Mine Recognition Using Sidescan Sonar Data., , and . SMC, page 553-558. IEEE, (2009)An intelligent through-the-wall recognition system for homeland security., , and . IJCNN, page 2084-2090. IEEE, (2008)