Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One Secure IoT Scheme for Protection of True Nodes., , , , , and . SmartCom, volume 11344 of Lecture Notes in Computer Science, page 143-152. Springer, (2018)Life Support System by Motion Sensor-Based Behavior Monitoring and SNS-Based Information Sharing., , , and . IOV, volume 8662 of Lecture Notes in Computer Science, page 407-415. Springer, (2014)A Controlled Experiment Between Two Methods on Ten-Digits Air Writing., , and . CIT, page 299-302. IEEE Computer Society, (2016)A system for controlling personal computers by hand gestures using a wireless sensor device., , and . ISIC, page 109-115. IEEE, (2014)Real-Time Attitude Estimation of Sigma-Point Kalman Filter via Matrix Operation Accelerator., and . MCSoC, page 342-346. IEEE, (2019)Feedback Linearization for Nonlinear Systems With Time-Varying Input and Output Delays by Using High-Gain Predictors., and . IEEE Trans. Autom. Control., 61 (8): 2262-2268 (2016)A Support Method with Changeable Training Strategies Based on Mutual Adaptation between a Ubiquitous Pet and a Learner., , , , , and . IEICE Trans. Inf. Syst., 93-D (4): 858-872 (2010)Data-driven reconstruction method for electrical capacitance tomography., , , , and . Neurocomputing, (2018)Codeword Position Index Based Sparse Code Multiple Access System., , , , , and . IEEE Wirel. Commun. Lett., 8 (3): 737-740 (2019)Least Ambiguous Set-Valued Classifiers with Bounded Error Levels., , and . CoRR, (2016)