Author of the publication

Evaluation of Two Approaches for Aligning Data Obtained from a Motion Capture System and an In-Shoe Pressure Measurement System.

, and . Sensors, 14 (9): 16994-17007 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloud-based virtual desktop service using lightweight network display protocol., , , and . ICOIN, page 244-248. IEEE Computer Society, (2016)Robust Sparse Representation-Based Classification Using Online Sensor Data for Monitoring Manual Material Handling Tasks., , , , , and . IEEE Trans Autom. Sci. Eng., 15 (4): 1573-1584 (2018)Understanding the experiences of self-injurious behavior in autism spectrum disorder: Implications for monitoring technology design., , , , , , and . J. Am. Medical Informatics Assoc., 28 (2): 303-310 (2021)Evaluation of Two Approaches for Aligning Data Obtained from a Motion Capture System and an In-Shoe Pressure Measurement System., and . Sensors, 14 (9): 16994-17007 (2014)Design and Evaluation of Container-based Networking for Low-latency Edge Services., and . ICTC, page 1287-1289. IEEE, (2021)Online Classification and Sensor Selection Optimization With Applications to Human Material Handling Tasks Using Wearable Sensing Technologies., , , , and . IEEE Trans. Hum. Mach. Syst., 46 (4): 485-497 (2016)Human Gait During Level Walking With an Occupational Whole-Body Powered Exoskeleton: Not Yet a Walk in the Park., , , and . IEEE Access, (2021)MDED-Framework: A Distributed Microservice Deep-Learning Framework for Object Detection in Edge Computing., , , , , and . Sensors, 23 (10): 4712 (2023)Low Power Branch Predictor for Embedded Processors., , and . CIT, page 107-114. IEEE Computer Society, (2010)Shapelets-Based Intrusion Detection for Protection Traffic Flooding Attacks., , , and . DASFAA Workshops, volume 10829 of Lecture Notes in Computer Science, page 227-238. Springer, (2018)