Author of the publication

A reduced complexity DOA estimation method for real-valued sources in non-uniform sparse linear arrays.

, , , , and . ISPACS, page 580-585. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal resource allocation for cognitive radio networks with primary user outage constraint., , , and . EURASIP J. Wireless Comm. and Networking, (2015)Reduced Dimensional 2-D DOA Estimation via Least Partial Search with Automatic Pairing for Parallel Co-prime Arrays*., , , and . SAM, page 1-5. IEEE, (2020)The Application of the Internet of Things Technology in Apple Production., , , and . ICAIT, page 109-112. IEEE, (2019)Joint beamforming and cooperative jamming for secure transmission in multi-antenna decode-and-forward relaying sensor networks: A greedy switching strategy., , , , , , and . Int. J. Distributed Sens. Networks, (2017)An Incentive Mechanism Design View in Hybrid Access Control in Small Cell Networks., , , , and . VTC Spring, page 1-5. IEEE, (2016)Power allocation for regenerative cognitive relay networks with QoS-guaranteed primary user., , , and . ChinaCom, page 535-538. IEEE, (2014)Power allocation for two-way communication underlay full duplex cognitive radio systems with QOS constraint of primary user., , , , and . ISPACS, page 130-134. IEEE, (2017)Design of Mobile Botnet Based on Open Service., , , , and . Int. J. Digit. Crime Forensics, 8 (3): 1-10 (2016)A Computationally Efficient 2-D DOA Estimation Approach for Non-uniform Co-prime Arrays., , , , and . ChinaCom (2), volume 210 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 183-192. Springer, (2016)An Effective Personnel Detection System Based on Radio Frequency Identification., , , , , , , and . ICAIT, page 78-81. IEEE, (2019)